There is no easy way to this now, but we could add a new option to that 
payload which did a callback to encapsulate the command and decapsulate 
the response. The exploit could then set the DefaultOptions hash to 
register this callback.

On Wednesday 19 March 2008, Patrick Webster wrote:
> I *could* use a cmd generic payload and sock.put("specialchars" +
> payload + "some more chars")... but; Is it possible to use the
> cmd_interact type and wrap every new line into the chars required and
> then sock.put it?

Framework-Hackers mailing list

Reply via email to