Metasploit mailing list archives

A small Windows problem


From: onatan at gmail.com (Jonatan B)
Date: Fri, 10 Jun 2005 16:08:02 +0200

On 6/10/05, Vijay Mukhi <vmukhi at vsnl.com> wrote:
 
I am writing a tutorial on MetaSploit at www.vijaymukhi.com. I have a tiny
server listening on port 2000 at IP address 70.0.0.2. When I run the
following exploit it overruns a 8 byte buffer on my server and opens a DOS
box on the server. Being a teacher I try and make my code as easy to
understand as possible and hence have hard coded the addresses,  0012ff8c is
the address on the stack where my shell code starts. 
<snip>   
I set the payload to win32_bin. When I now run the exploit I expect the
system to open a dos box on the machine that I am running my exploit on and
connect it to the target machine. nothing happens. what am I doing wrong.
any Help or pointers would be higly appreciated. 

Have your perl echo the shellcode/buffer before sending it, and compare it to
the hardcoded shellcode.
Metasploit might be smarter than you think. :)

Jonathan.



Current thread: