Metasploit mailing list archives

Opcode db suggestion and msfencode question


From: RaMatkal at hotmail.com (RaMatkal)
Date: Wed, 25 May 2005 16:51:53 +0200

Great work on 2.4!

A quick suggestion and a question....

The opcode database is terrific! A really nifty addition to the opcode db would be the ability to specify bad 
characters to filter from the return addresses....For example, only show those return addresses whose ascii values are 
valid alphanumeric characters....

Now for my question....im trying to exploit a server which filters all non-alpha numeric characters.....in order to 
land on my encoded shellcode, i need to do a couple of jumps....since 'eb' and 'e9' are filtered i figure i can encode 
the jumps with msfencode...

anyone done this before or have any neat advice on how to do JMP's when only alphanumeric chars are valid..

I tried putting an 'eb 06' into <filename> and then trying: 

/msfencode -i <filename> -e PexAlphaNum 

but got back a 79 byte payload which still contained a couple of 'eb' s  (obviously needed for the encoder function at 
the beginning right?)....

Any suggestions/advice/help would be greatly appreciated....

RaMatkal
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20050525/6fa5739b/attachment.htm>


Current thread: