Home page logo
/

metasploit logo Metasploit mailing list archives

Re: function hash generation
From: Ty Miller <tyronmiller () gmail com>
Date: Wed, 9 Jun 2010 20:54:16 +1000

Awesome. Thanks.

On Wednesday, June 9, 2010, Stephen Fewer
<stephen_fewer () harmonysecurity com> wrote:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

For the x86 and x64 windows payloads which use the same hashing system
you can use the hash.py file located in
'\msf3\external\source\shellcode\windows\x86\src'

python hash.py kernel32.dll WinExec
[+] Ran on Wed Jun 09 10:01:03 2010

[+] 0x876F8B31 = kernel32.dll!WinExec

Their is also an online repository of function hashes by scriptjunkie1
located at http://scriptjunkie1.110mb.com/hashes/index.html

- - Stephen.

On 09/06/2010 09:57, Ty Miller wrote:
Hey guys,

Is there a tool to generate the function hashes to use within Metasploit
payloads? Eg, something like "msfpayload --hash LoadLibraryA" or something?

Thanks,
Ty




_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)

iEYEARECAAYFAkwPWa4ACgkQQIrmi1YdFr7ZGwCeI3mLvclLyzvEhIEM1sPBnB6w
nUwAoLGPSnyIHO2RVR830/3/0X5lK+Sk
=wwpl
-----END PGP SIGNATURE-----

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault