Metasploit mailing list archives

Microsoft SQL Server Distributed Management Objects OLE DLL


From: manish.gupta at ariosesoftware.com (Manish Gupta)
Date: Fri, 14 Sep 2007 14:04:02 +0530

 

 

Thanks for providing me the information.

 

 

 

Regards

Manish Gupta

Ariose Software 

Noida (U.P)

Mbl:-+91-9891650667

 

 

 

-----Original Message-----
From: H D Moore [mailto:hdm at metasploit.com] 
Sent: Friday, September 14, 2007 9:55 AM
To: framework at metasploit.com
Subject: Re: [framework] Microsoft SQL Server Distributed Management Objects
OLE DLL

 

Please don't repost the same message in the future. If youre trying to 

find the server length that triggers the overflow, try setting it to 

incrementing lengths and reloading it until it crashes. If you know that 

the string in question overwrites EIP, you can use the pattern_create() 

function to generate a string which will allow you to determine the 

offset based on the crash information. Considering how little information 

you provided in your email (about what you tried and what you are looking 

for), its hard to say which method would work best for you.

 

Please keep email to the list plain-text only as well ;-)

 

-HD

 

On Thursday 13 September 2007 22:47, Manish Gupta wrote:

I am not able to find the server length so please help me.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070914/210a035f/attachment.htm>


Current thread: