Metasploit mailing list archives
Question about Rpc/Dcom exploit
From: steganos at crazynet.org (Mattiew J.)
Date: Sun, 13 Mar 2005 10:22:51 +0100
Hi Bob, I only would like to know what they do in function line strcpy, wcscpy, etc (apart the 0x0 string terminator of course)... not just their ASCII codes ;) Thanks ----- Original Message ----- From: "Stormwalker" <bruen at coldrain.net> To: "Mattiew J." <steganos at crazynet.org> Cc: <framework at metasploit.com> Sent: Friday, March 11, 2005 9:19 PM Subject: Re: [framework] Question about Rpc/Dcom exploit
Hi Mattiew, x0A = Line feed x0D = Carriage return x5F = Underscore x2F = forward slash x2E = period cheers, bob On Fri, 11 Mar 2005, Mattiew J. wrote:After a look at msrpc_dcom_ms03_026.pm I wonder why so many restricted
bytes
are in the BadChars set. I know \x00 is the NULL string terminator, \x5C the UNC path terminator (??), but I have no idea what those \x0A \x0D \x5F \x2F \x2E are for... Could anyone enlighten me about this?
Current thread:
- Question about Rpc/Dcom exploit Mattiew J. (Mar 11)
- Question about Rpc/Dcom exploit H D Moore (Mar 11)
- Question about Rpc/Dcom exploit Stormwalker (Mar 11)
- Question about Rpc/Dcom exploit Mattiew J. (Mar 13)