Metasploit mailing list archives
A small Windows problem
From: onatan at gmail.com (Jonatan B)
Date: Fri, 10 Jun 2005 16:08:02 +0200
On 6/10/05, Vijay Mukhi <vmukhi at vsnl.com> wrote:
I am writing a tutorial on MetaSploit at www.vijaymukhi.com. I have a tiny server listening on port 2000 at IP address 70.0.0.2. When I run the following exploit it overruns a 8 byte buffer on my server and opens a DOS box on the server. Being a teacher I try and make my code as easy to understand as possible and hence have hard coded the addresses, 0012ff8c is the address on the stack where my shell code starts.
<snip>
I set the payload to win32_bin. When I now run the exploit I expect the system to open a dos box on the machine that I am running my exploit on and connect it to the target machine. nothing happens. what am I doing wrong. any Help or pointers would be higly appreciated.
Have your perl echo the shellcode/buffer before sending it, and compare it to the hardcoded shellcode. Metasploit might be smarter than you think. :) Jonathan.
Current thread:
- A small Windows problem Vijay Mukhi (Jun 10)
- A small Windows problem Jonatan B (Jun 10)