Generic x86 Tight Loop - Metasploit
This page contains detailed information about how to use the payload/generic/tight_loop metasploit module. For list of all metasploit modules, visit the Metasploit Module Library.
Module Overview
Name: Generic x86 Tight Loop
Module: payload/generic/tight_loop
Source code: modules/payloads/singles/generic/tight_loop.rb
Disclosure date: -
Last modification time: 2020-09-22 02:56:51 +0000
Supported architecture(s): x86
Supported platform(s): BSD, BSDi, Linux, OSX, Solaris, Windows
Target service / protocol: -
Target network port(s): -
List of CVEs: -
Generate a tight loop in the target process
Module Ranking and Traits
Module Ranking:
- normal: The exploit is otherwise reliable, but depends on a specific version and can't (or doesn't) reliably autodetect. More information about ranking can be found here.
Basic Usage
msf > use payload/generic/tight_loop
msf payload(tight_loop) > show options
... show and set options ...
msf payload(tight_loop) > generate
To learn how to generate payload/generic/tight_loop with msfvenom, please read this.
Go back to menu.
Msfconsole Usage
Here is how the generic/tight_loop payload looks in the msfconsole:
msf6 > use payload/generic/tight_loop
msf6 payload(generic/tight_loop) > show info
Name: Generic x86 Tight Loop
Module: payload/generic/tight_loop
Platform: BSD, BSDi, Linux, OSX, Solaris, Windows
Arch: x86
Needs Admin: No
Total size: 2
Rank: Normal
Provided by:
jduck <[email protected]>
Description:
Generate a tight loop in the target process
Module Options
This is a complete list of options available in the generic/tight_loop payload:
msf6 payload(generic/tight_loop) > show options
Module options (payload/generic/tight_loop):
Name Current Setting Required Description
---- --------------- -------- -----------
Advanced Options
Here is a complete list of advanced options supported by the generic/tight_loop payload:
msf6 payload(generic/tight_loop) > show advanced
Module advanced options (payload/generic/tight_loop):
Name Current Setting Required Description
---- --------------- -------- -----------
VERBOSE false no Enable detailed status messages
WORKSPACE no Specify the workspace for this module
Go back to menu.
Related Pull Requests
- #14202 Merged Pull Request: Implement the zeitwerk autoloader within lib/msf/core
- #8716 Merged Pull Request: Print_Status -> Print_Good (And OCD bits 'n bobs)
- #8338 Merged Pull Request: Fix msf/core and self.class msftidy warnings
- #6655 Merged Pull Request: use MetasploitModule as a class name
- #4894 Merged Pull Request: Implement payload size caching, speeding up framework loads
- #2525 Merged Pull Request: Change module boilerplate
- #2417 Merged Pull Request: Prefer Ruby style for single word collections
- #1241 Merged Pull Request: Removed all $Id$ and $Revision$ occurences
Go back to menu.
See Also
Check also the following modules related to this module:
- payload/generic/custom
- payload/generic/debug_trap
- payload/generic/shell_bind_tcp
- payload/generic/shell_reverse_tcp
- payload/generic/ssh/interact
- encoder/cmd/generic_sh
- encoder/generic/eicar
- encoder/generic/none
- exploit/unix/webapp/generic_exec
- exploit/windows/http/generic_http_dll_injection
- exploit/windows/smb/generic_smb_dll_injection
- nop/cmd/generic
- nop/php/generic
- nop/tty/generic
- payload/cmd/mainframe/generic_jcl
- payload/cmd/unix/generic
- payload/cmd/windows/generic
- payload/cmd/windows/powershell/generic/debug_trap
- payload/cmd/windows/powershell/generic/tight_loop
Authors
jduck
Version
This page has been produced using Metasploit Framework version 6.2.1-dev. For more modules, visit the Metasploit Module Library.
Go back to menu.