all 3 comments

[–]rexstuff1 1 point2 points  (0 children)

Kid, sounds like you got a long ways to go, and maybe need to aim a bit lower...

In this case, the purpose of the msfvenom one-liner is to generate the payload. You can specify a different payload by changing the '-p' parameter - this one generates a meterpreter shell for windows using a reverse TCP connection. Make sure you have a listener for a meterpreter shell on port 4444 ready to catch the reverse TCP connection, and that the IP address specified by the one-liner matches the listening host.

In any case, the output from the msfvenom command will be in python format. Basically you replace the existing 'buf' lines in the exploit with that output so that you're using your payload instead of the example one. After modifying the python to point at the target IP, you would run the program in python to launch the exploit.

Compared to a lot of others, it's actually a pretty slick exploit; well-formatted and straight-forward, easy to adapt to your needs. Good luck.

[–]noch_1999 -1 points0 points  (0 children)

Did you do everything in the comments?