There is no easy way to this now, but we could add a new option to that payload which did a callback to encapsulate the command and decapsulate the response. The exploit could then set the DefaultOptions hash to register this callback.
On Wednesday 19 March 2008, Patrick Webster wrote: > I *could* use a cmd generic payload and sock.put("specialchars" + > payload + "some more chars")... but; Is it possible to use the > cmd_interact type and wrap every new line into the chars required and > then sock.put it? _______________________________________________ Framework-Hackers mailing list Framework-Hackers@spool.metasploit.com http://spool.metasploit.com/mailman/listinfo/framework-hackers