|Main Archive Page > Month Archives > metasploit-framework archives|
I am using this payload cmd/windows/reverse_perl encoded (150 bytes)
since I have only 268 bytes to place my shellcode.
But I am not getting any reverse shell, I debugged the process and the
shellcode is loaded in memory and decoded without problems.
I also install perl in the Windows Vista 32-bit box but still no shell back.
Is there any kind of requirement for this payload to succeed?
-- Daniel Regalado aka Danux Hacker Wanna Be de Nezahualcoyotl www.macula-group.com _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework