Metasploit mailing list archives
Using encoders directly
From: tkrpata at bjs.com (Krpata, Tyler)
Date: Thu, 21 Dec 2006 11:19:56 -0500
I think this question got lost in my last post, so I thought I'd start a new thread about it. Should I be able to use the encoders in Metasploit directly? What I'd like to do is use the Alpha2 encoder something like: payload = Rex::Encoder::Alpha2::UnicodeMixed.encode(shellcode,"EBX",0) The "shellcode" argument in this case is actually the code retrieved from the "egghunter" class. Backtrace: ./lib/rex/encoder/alpha2/generic.rb:55:in `encode_byte' ./lib/rex/encoder/alpha2/generic.rb:84:in `encode' ./lib/rex/encoder/alpha2/generic.rb:81:in `encode' /home/tyler/framework3/modules/exploits/windows/novell/novell_nwspool.rb :92:in `exploit' ./lib/msf/core/exploit_driver.rb:189:in `job_run_proc' ./lib/msf/core/exploit_driver.rb:152:in `run' ./lib/msf/base/simple/exploit.rb:118:in `exploit_simple' ./lib/msf/base/simple/exploit.rb:127:in `exploit_simple' ./msfcli:153 -- Tyler Krpata Sr. Security Administrator BJ's Wholesale Club, Inc. 508-651-6830 Supporting Member, [' or 1=1--] (www.apostropheor1equals1dashdash.com)
Current thread:
- Using encoders directly Krpata, Tyler (Dec 21)
- Using encoders directly mmiller at hick.org (Dec 27)
- <Possible follow-ups>
- Using encoders directly Krpata, Tyler (Dec 27)
- Using encoders directly mmiller at hick.org (Dec 27)