Metasploit mailing list archives
Raw payload works, but encoded version doesn't
From: laxwy at yahoo.com (Whit)
Date: Thu, 17 May 2007 22:26:05 -0700 (PDT)
I just started using Metasploit and its worked great so far. I'm having trouble, though with the shellcode that is being generated after it goes through the encoder. I'm targeting a custom service on a VM. I know it's vulnerable. I've exploited it with and without Metasploit. I can only get it to work with Metasploit when I use a raw payload, though. The program segfaults when I use the encoded version of the payload. I've debugged using GDB and am sure that everything leading up to the shellcode execution is correct. It's a simple buffer overflow that overwrites a return address. It returns to the proper address and continues just fine. It always gets through the nop sled. It just doesn't ever actually execute the shellcode properly. I've tried a bunch of different payloads and they all segfault as well. Any thoughts? Info on the target (VM): Linux version 2.6.8-1-686 (joshk at trollwife) (gcc version 3.3.5 (Debian 1:3.3.5-2)) #1 Thu Nov 25 04:34:30 UTC 2004 Thanks! ____________________________________________________________________________________Looking for a deal? Find great prices on flights and hotels with Yahoo! FareChase. http://farechase.yahoo.com/
Current thread:
- Raw payload works, but encoded version doesn't Whit (May 17)
- Raw payload works, but encoded version doesn't mmiller at hick.org (May 17)
- Raw payload works, but encoded version doesn't Pranay Kanwar (May 18)
- Raw payload works, but encoded version doesn't H D Moore (May 18)