Metasploit mailing list archives

No encoder encoded the buffer.


From: metafan at intern0t.net (MaXe)
Date: Thu, 20 Nov 2008 11:06:16 +0100

Have you tried issueing the following command?
info windows/iis/ms02_018_htr

And then when you look at the payload size (or whatever it is named), then
compare it to the payload that you are using? Because not all exploits has
infinite space for the payload, which is why you have to use very simple 
exploits,
thus some needs a little "work" in order to, work. :)

If you wonder why there is a space limit, and what it is defined as, the 
maximum
payload size as an integer number are the number of characters in your 
shell code
while the space limit is because the finite sized buffer (if it's an 
buffer overflow),
has a limit on how many characters you can send before it crashes and 
can't be
used for further exploitation.


~ MaXe

giuseppe pugliares wrote:
I'm tryng to use shell/reverse_tcp payload with  
windows/iis/ms02_018_htr exploit, but when i launch exploit i receive 
this message:
No encoder encoded the buffer successfuly.
Any idea?

Thanks.

Giuseppe Pugliares

------------------------------------------------------------------------

_______________________________________________
http://spool.metasploit.com/mailman/listinfo/framework
  




Current thread: