There is no easy way to this now, but we could add a new option to that 
payload which did a callback to encapsulate the command and decapsulate 
the response. The exploit could then set the DefaultOptions hash to 
register this callback.

On Wednesday 19 March 2008, Patrick Webster wrote:
> I *could* use a cmd generic payload and sock.put("specialchars" +
> payload + "some more chars")... but; Is it possible to use the
> cmd_interact type and wrap every new line into the chars required and
> then sock.put it?


_______________________________________________
Framework-Hackers mailing list
Framework-Hackers@spool.metasploit.com
http://spool.metasploit.com/mailman/listinfo/framework-hackers

Reply via email to