Metasploit mailing list archives
Executable Download and Execute - payload
From: opexoc at gmail.com (Jan Grzdyl)
Date: Sun, 16 Dec 2007 12:24:57 +0100
On Dec 16, 2007 5:00 AM, J.M. Seitz <jms at bughunter.ca> wrote:
Hmmm. Here are a few things to try: 1) Instead of using 0x90's for your sled use 0xCC and trace the execution of the shellcode. 2) When the first access violation occurs make sure you are doing a SHIFT+F7/F8/F9 which will pass the exception to the debugged process.
Firstly I do not use sled because I am trying to debug this shellcode by
application like this:
unsigned char scode[] =
"<Your shellcode>";
int main(){
((void (*)()) scode)();
return 0;
}
And when I am using ollydbg and let it runs this program everything is fine,
but when I am executing this program step over by step over then in some
moment olly says that exception occured and I may redirect exception to
program - I do that. Subsequently ollydbg says that program can't handle
this exception and program is terminated. I really do not understand this
issue because program when executed normally everything is ok.
I try to exploit some app and in my exploit I overwrite SEH - this shellcode
does not work for this exploit.
best
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20071216/14d74cc3/attachment.htm>
Current thread:
- Executable Download and Execute - payload Jan Grzdyl (Dec 15)
- Executable Download and Execute - payload J.M. Seitz (Dec 15)
- Executable Download and Execute - payload Jan Grzdyl (Dec 16)
- Executable Download and Execute - payload J.M. Seitz (Dec 16)
- Executable Download and Execute - payload Jan Grzdyl (Dec 16)
- Executable Download and Execute - payload H D Moore (Dec 16)
- Executable Download and Execute - payload Jan Grzdyl (Dec 16)
- Executable Download and Execute - payload J.M. Seitz (Dec 15)
- Executable Download and Execute - payload Jan Grzdyl (Dec 16)
