There is no easy way to this now, but we could add a new option to that
payload which did a callback to encapsulate the command and decapsulate
the response. The exploit could then set the DefaultOptions hash to
register this callback.
On Wednesday 19 March 2008, Patrick Webster wrote:
> I *could* use a cmd generic payload and sock.put("specialchars" +
> payload + "some more chars")... but; Is it possible to use the
> cmd_interact type and wrap every new line into the chars required and
> then sock.put it?
Framework-Hackers mailing list