Metasploit mailing list archives
Metasploit vs ANI
From: hdm at metasploit.com (H D Moore)
Date: Wed, 4 Apr 2007 08:41:56 -0500
Use the NASM shell (if you have nasm and ndisasm installed, or use the Windows version): $ msf3/tools/nasm_shell.rb nasm > jmp [ebx+4] 00000000 FF6304 jmp near [ebx+0x4] nasm > call [ebx+4] 00000000 FF5304 call near [ebx+0x4] So we need to find one of those two, using msfpescan: $ msf3/msfpescan -r "\xff[\x53\x63]\x04" /path/to/some/loaded.dll [/path/to/some/loaded.dll] 0x77d7d207 ff5304 -HD On Wednesday 04 April 2007 02:35, Thomas Werth wrote:
How can i use msfpescan to find an ebx+4 in user32.dll ? ./msfpescan -j ebx+4 /path/to/user32.dll raises ( no surprise) syntax error, ./msfpescan -j ebx /path/to/user32.dll just lists ebx calls-
Current thread:
- Metasploit vs ANI, (continued)
- Metasploit vs ANI mmiller at hick.org (Apr 02)
- Metasploit vs ANI H D Moore (Apr 02)
- Metasploit vs ANI Giorgio Casali (Apr 03)
- Metasploit vs ANI Thomas Werth (Apr 03)
- Metasploit vs ANI mmiller at hick.org (Apr 03)
- Metasploit vs ANI Thomas Werth (Apr 03)
- Metasploit vs ANI mmiller at hick.org (Apr 03)
- Metasploit vs ANI Thomas Werth (Apr 03)
- Metasploit vs ANI mmiller at hick.org (Apr 04)
- Metasploit vs ANI Thomas Werth (Apr 04)
- Metasploit vs ANI H D Moore (Apr 04)
- Metasploit vs ANI H D Moore (Apr 04)
- Metasploit vs ANI Fabrice MOURRON (Apr 04)
- Metasploit vs ANI security (Apr 05)
- Metasploit vs ANI Jerome Athias (Apr 05)
- Metasploit vs ANI security (Apr 05)
- Metasploit vs ANI Thomas Werth (Apr 11)
- Metasploit vs ANI Donnie Werner (Apr 05)
- Metasploit vs ANI Jerome Athias (Apr 04)
- Metasploit vs ANI Jerome Athias (Apr 04)
- Metasploit vs ANI Josh Caster (Apr 03)