Metasploit mailing list archives

Encoder(?) problems.


From: hdm at metasploit.com (H D Moore)
Date: Sun, 1 Jul 2007 00:40:43 -0500

Could be the heap routines are corrupting the payload and it just happens 
to skip it with the manual encoding (chunk flag, etc). Try sticking a 
known pattern of bytes in place of the payload and seeing whether these 
are becoming corrupted as well. Something like:

"\xcc" + ([*(0.255)].pack('C*') * 2)

(int3 + 0-255 repeated twice)

-HD

On Saturday 30 June 2007 23:57, Reth wrote:
Any more ideas?



Current thread: