Metasploit mailing list archives

Question about Rpc/Dcom exploit


From: steganos at crazynet.org (Mattiew J.)
Date: Sun, 13 Mar 2005 10:22:51 +0100

Hi Bob,

I only would like to know what they do in function line strcpy, wcscpy, etc
(apart the 0x0 string terminator of course)... not just their ASCII codes ;)

Thanks

----- Original Message -----
From: "Stormwalker" <bruen at coldrain.net>
To: "Mattiew J." <steganos at crazynet.org>
Cc: <framework at metasploit.com>
Sent: Friday, March 11, 2005 9:19 PM
Subject: Re: [framework] Question about Rpc/Dcom exploit



Hi Mattiew,

x0A = Line feed
x0D = Carriage return
x5F = Underscore
x2F = forward slash
x2E = period


            cheers, bob

On Fri, 11 Mar 2005, Mattiew J. wrote:
After a look at msrpc_dcom_ms03_026.pm I wonder why so many restricted
bytes
are in the  BadChars set.
I know \x00 is the NULL string terminator, \x5C the UNC path terminator
(??), but I have no idea what those \x0A \x0D \x5F \x2F \x2E are for...
Could anyone enlighten me about this?








Current thread: