Metasploit mailing list archives
bad char issue
From: muhaimin.dzulfakar at security-assessment.com (Muhaimin Dzulfakar)
Date: Fri, 26 Oct 2007 15:35:16 +1300
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I just wrote an exploit using metasploit platform and had an issue in my payload. I found the metasploit itself change one of the character in my payload not the vulnerable application. I confirmed this by sniffing the packet.The changed character was \xb2 which had been changed to \x44. I dont think I've to add that character under BadChar as It's not the application which change my payload but my exploit code.How that could happen ? Please advise -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFHIVJkhQzHS1wybNARAiXfAKC0XzBUSKcwcr9wHVdn0UJelZxuxACfSNYw G83MaL/hkwvs8kp2vpqPA1k= =OsJV -----END PGP SIGNATURE-----
Current thread:
- bad char issue Muhaimin Dzulfakar (Oct 25)
- bad char issue H D Moore (Oct 25)