Metasploit mailing list archives
Metasploit vs ANI
From: nicolas.ruff at gmail.com (Nicolas RUFF)
Date: Mon, 02 Apr 2007 23:45:18 +0200
I'm not in a place to test this, but can you try this patch out and see if it fixes the problem for you: - riff[trampoline_doffset + 1, 4] = [riff.length - trampoline_doffset - 4].pack('V') + riff[trampoline_doffset + 1, 4] = [riff.length - trampoline_doffset - 5].pack('V')
"Worked for me" (tm), with payload windows/meterpreter/reverse_tcp. Thanks alot! All I need now is a way to escape protected mode ;) Regards, - Nicolas RUFF
Current thread:
- Metasploit vs ANI, (continued)
- Metasploit vs ANI H D Moore (Apr 04)
- Metasploit vs ANI Fabrice MOURRON (Apr 04)
- Metasploit vs ANI security (Apr 05)
- Metasploit vs ANI Jerome Athias (Apr 05)
- Metasploit vs ANI security (Apr 05)
- Metasploit vs ANI Thomas Werth (Apr 11)
- Metasploit vs ANI Donnie Werner (Apr 05)
- Metasploit vs ANI Jerome Athias (Apr 04)
- Metasploit vs ANI Jerome Athias (Apr 04)
- Metasploit vs ANI Josh Caster (Apr 03)
- Metasploit vs ANI Nicolas RUFF (Apr 02)