Metasploit mailing list archives
Payload Bugs ?
From: patrick at aushack.com (Patrick Webster)
Date: Wed, 29 Aug 2007 10:15:36 +1000
I assume your german return address is correct. Try using a shellcode with a stack adjustment of -3500. Otherwise your payload may be using bad characters which are not accepted, or the payload code is changed by other instructions before you execute, by the target application? -Patrick -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070829/b1ca6513/attachment.htm>
Current thread:
- Payload Bugs ? Thomas Werth (Aug 28)
- Payload Bugs ? H D Moore (Aug 28)
- Payload Bugs ? Patrick Webster (Aug 28)
- Payload Bugs ? Thomas Werth (Aug 28)
- Payload Bugs ? J. M. Seitz (Aug 28)
- Payload Bugs ? Thomas Werth (Aug 28)
- Payload Bugs ? J. M. Seitz (Aug 29)
- Payload Bugs ? Thomas Werth (Aug 29)
- Payload Bugs ? Thomas Werth (Aug 29)
- Payload Bugs ? Jerome Athias (Aug 29)
- need help porting exploit to win2k Thomas Werth (Aug 29)
- need help porting exploit to win2k Jerome Athias (Aug 29)
- need help porting exploit to win2k Thomas Werth (Aug 29)
- Payload Bugs ? Patrick Webster (Aug 28)
- Payload Bugs ? H D Moore (Aug 28)