Metasploit mailing list archives
Metasploit vs ANI
From: jackdirio at alice.it (jackdirio at alice.it)
Date: Tue, 3 Apr 2007 16:05:05 +0200
Try to change the shellcode (exadecimal) of the payload.... Maybe is that.... I found same problem with old version of MSF...... In particular, with linux_ia32_reverse in msf 2.7.....so I tried to use reverse_shell of msf 2.6 and it worked!!!! just modify the shellcode! enjoy...:) ----- Original Message ----- From: "Thomas Werth" <thomas.werth at vahle.de> To: <framework at metasploit.com> Sent: Tuesday, April 03, 2007 10:54 AM Subject: Re: [framework] Metasploit vs ANI
I'm using bt2 final and can confirm bogus chars in IE 6/7 on win xp . Giorgio Casali schrieb:I'm using Backtrack installed on my HD and as payload windows/meterpreter/reverse_tcp, but still no luck... Explorer 7 and firefox are showing ASCII chars when directed to my crafted page. Giorgio. 2007/4/2, H D Moore <hdm at metasploit.com>:Aviv Raff confirmed this patch, merged into dev/stable. Running these exploits *from* Windows seems to be buggy still, but using something like BackTrack 2.0 or a non-Linux system to run the exploits seems fine. -HD On Monday 02 April 2007 15:40, mmiller at hick.org wrote:Thanks for the report, Nicolas. I think you're right (although it's pretty weird that this worked in my test environment). I'm not in a place to test this, but can you try this patch out and see if it fixes the problem for you:
-------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070403/7324a712/attachment.htm>
Current thread:
- Metasploit vs ANI, (continued)
- Metasploit vs ANI security (Apr 05)
- Metasploit vs ANI Jerome Athias (Apr 05)
- Metasploit vs ANI security (Apr 05)
- Metasploit vs ANI Thomas Werth (Apr 11)
- Metasploit vs ANI Donnie Werner (Apr 05)
- Metasploit vs ANI Jerome Athias (Apr 04)
- Metasploit vs ANI Jerome Athias (Apr 04)
- Metasploit vs ANI Josh Caster (Apr 03)
- Metasploit vs ANI Nicolas RUFF (Apr 02)