Metasploit mailing list archives

Using encoders directly


From: tkrpata at bjs.com (Krpata, Tyler)
Date: Thu, 21 Dec 2006 11:19:56 -0500

I think this question got lost in my last post, so I thought I'd start a
new thread about it.

Should I be able to use the encoders in Metasploit directly? What I'd
like to do is use the Alpha2 encoder something like:
payload = Rex::Encoder::Alpha2::UnicodeMixed.encode(shellcode,"EBX",0)

The "shellcode" argument in this case is actually the code retrieved
from the "egghunter" class. 

Backtrace:
./lib/rex/encoder/alpha2/generic.rb:55:in `encode_byte'
./lib/rex/encoder/alpha2/generic.rb:84:in `encode'
./lib/rex/encoder/alpha2/generic.rb:81:in `encode'
/home/tyler/framework3/modules/exploits/windows/novell/novell_nwspool.rb
:92:in `exploit'
./lib/msf/core/exploit_driver.rb:189:in `job_run_proc'
./lib/msf/core/exploit_driver.rb:152:in `run'
./lib/msf/base/simple/exploit.rb:118:in `exploit_simple'
./lib/msf/base/simple/exploit.rb:127:in `exploit_simple'
./msfcli:153

-- 
Tyler Krpata
Sr. Security Administrator
BJ's Wholesale Club, Inc.
508-651-6830
Supporting Member, [' or 1=1--]
(www.apostropheor1equals1dashdash.com)




Current thread: