Metasploit mailing list archives

bad char issue


From: muhaimin.dzulfakar at security-assessment.com (Muhaimin Dzulfakar)
Date: Fri, 26 Oct 2007 15:35:16 +1300

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


I just wrote an exploit using metasploit platform and had an issue in
my payload.
I found the metasploit itself change one of the character in my
payload not the vulnerable application.
I confirmed this by sniffing the packet.The changed character was \xb2
which had been changed to \x44. I dont think I've to add that
character under BadChar as It's not the application which change my
payload but my exploit code.How that could happen ?

Please advise


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFHIVJkhQzHS1wybNARAiXfAKC0XzBUSKcwcr9wHVdn0UJelZxuxACfSNYw
G83MaL/hkwvs8kp2vpqPA1k=
=OsJV
-----END PGP SIGNATURE-----




Current thread: