19 lines
999 B
Gherkin
19 lines
999 B
Gherkin
|
#This feature contains scenarios that test the various encoders within the metasploit framework
|
||
|
|
||
|
@announce-stdout
|
||
|
|
||
|
Feature: As a Metasploit Framework user
|
||
|
I want to user encoders
|
||
|
So that I can encode various payloads I might use for attacks
|
||
|
|
||
|
Scenario: Create a windows tcp bind payload using the x86/unicode mixed encoder
|
||
|
When I run msfvenom to encode for windows using the "x86/unicode_mixed" encoder with "-i 1" options and a buffer register
|
||
|
#When I run `./msfvenom -p windows/shell/bind_tcp -e x86/unicode_mixed -i 1 BufferRegister=eax` interactively
|
||
|
Then the output should contain "x86/unicode_mixed succeeded with size"
|
||
|
|
||
|
Scenario: Create a windows tcp bind payload encoded with x86 alpha mixed
|
||
|
When I run msfvenom to encode for windows using the "x86/alpha_mixed" encoder with "-b '\x00' -i 1" options
|
||
|
#When I run `./msfvenom -p windows/shell/bind_tcp -e x86/alpha_mixed -b '\x00' -i 1` interactively
|
||
|
Then the output should contain "x86/alpha_mixed succeeded with size"
|
||
|
|