Metasploit mailing list archives

Metasploit vs ANI


From: jackdirio at alice.it (jackdirio at alice.it)
Date: Tue, 3 Apr 2007 16:05:05 +0200

Try to change the shellcode (exadecimal) of the payload....
Maybe is that....
I found same problem with old version of MSF......
In particular, with linux_ia32_reverse in msf 2.7.....so I tried to use 
reverse_shell of msf 2.6 and it worked!!!!
just modify the shellcode!
enjoy...:)


----- Original Message ----- 
From: "Thomas Werth" <thomas.werth at vahle.de>
To: <framework at metasploit.com>
Sent: Tuesday, April 03, 2007 10:54 AM
Subject: Re: [framework] Metasploit vs ANI


I'm using bt2 final and can confirm bogus chars in IE 6/7 on win xp .

Giorgio Casali schrieb:
I'm using Backtrack installed on my HD and as payload
windows/meterpreter/reverse_tcp, but still no luck...
Explorer 7 and firefox are showing ASCII chars when directed to my
crafted page.

Giorgio.



2007/4/2, H D Moore <hdm at metasploit.com>:
Aviv Raff confirmed this patch, merged into dev/stable. Running these
exploits *from* Windows seems to be buggy still, but using something 
like
BackTrack 2.0 or a non-Linux system to run the exploits seems fine.

-HD

On Monday 02 April 2007 15:40, mmiller at hick.org wrote:
Thanks for the report, Nicolas.  I think you're right (although it's
pretty weird that this worked in my test environment).

I'm not in a place to test this, but can you try this patch out and 
see
if it fixes the problem for you:


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070403/7324a712/attachment.htm>


Current thread: