sometimes when exploiting a hole in a webpage eg. php. the exploit fails because of a filter.The filter may be filtering all non-printable characters(which is quite often).
to bypass the filter, you can "encode" the payload. ie. just before issuing "exploit" type
set ENCODE
where encoder is one of the compatible encodess. to see these, type
show encoders
good luck!!
No comments:
Post a Comment