-
Couldn't load subscription status.
- Fork 40
Description
As discussed on our call, add a new payload "type" option that allows for the exploit author to specify what type of payload is supported by the exploit. This will also need to have a set of reserved flags for the supported payload types, both allowing the exploit to check for the type of payload and also for the user to have an understanding of what they will need before exploit execution.
The theory here is we need to make support for custom payload binaries or command line flags passed to specific payloads types.
My current plan is to create a new payload.Types or similar that can be added to the config.Config from exploit setup. Combine that with a way to easily check for -o being set then select the sub payload.Types for influencing the payload generation. An example of payload.Types would be similar to:
WindowsEXEWindowsDLLWindowsCommandLinuxELFLinuxSOLinuxCommand- ... Adding more over time and variants for things like in-memory types will be a lot easier vs trying to retrofit and guess on top of
C2Type
This will probably need to reserve -payload, -payload-type, and/or -command as well as a sub-type of way to interact with those new payload types.
More details to come.
Metadata
Metadata
Assignees
Labels
Type
Projects
Status