Metasploit mailing list archives
New win32 bind shell.
From: vlad902 at gmail.com (Vlad902)
Date: Tue, 5 Oct 2004 22:20:31 -0700
I've plugged in some of my own (I'm a whore) win32 bind shellcode into metasploit and it's smaller (~49 bytes) and has all the functionality (or at least to my knowledge) of the current win32_bind (WSAStartup, WaitForSingleObject, closesocket, Exit{EXITFUNC}) but I don't have access to many windows versions/sps. It looks good on my win2k sp4 box, could people exploit test this against their own boxen and e-mail me off list (vlad902 [at] gmail.com) and tell me if it worked or not and the windows version/sp. Thanks alot. To test just download the attached file to payloads/ and set PAYLOAD to 902_bind. Thanks for testing, vlad902 -------------- next part -------------- A non-text attachment was scrubbed... Name: 902_bind.pm Type: application/octet-stream Size: 2685 bytes Desc: not available URL: <http://mail.metasploit.com/pipermail/framework/attachments/20041005/31fda032/attachment.obj>
Current thread:
- New win32 bind shell. Vlad902 (Oct 05)
- New win32 bind shell. Carric Dooley (Oct 05)