Metasploit mailing list archives

MS08-067 Win2K3 German lang. support


From: christopher.riley at r-it.at (christopher.riley at r-it.at)
Date: Mon, 13 Apr 2009 02:16:36 +0200

This is the same command that was listed for the Windows XP targets. Does this mean that i don't need to recreate Brett 
Moore's bypass completely ? Just the ret in svchost.exe and the disablenx address as with the XP exploits ?

Sorry for the n00b questions, but I'd rather understand the why and where of it than just run blind commands ;) gotta 
learn sometime.

Chris John Riley


----- Original Message -----
From: hdm
Sent: 12.04.2009 18:02 EST
To: framework at spool.metasploit.com
Subject: Re: [framework] MS08-067 Win2K3 German lang. support



On Mon, 2009-04-13 at 00:03 +0200, christopher.riley at r-it.at wrote:

Also what can I do to recreate the NX bypass for the German version.
Its not going to be as simple as the NO NX stuff I'm sure.

Thanks for looking into it - to get the DisableNX address, use the
following command:

$ msfpescan -r "\x6A\x04\x8D\x45\x08\x50\x6A\x22\x6A\xFF" acgenral.dll

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

----------------------------------------
Raiffeisen Informatik GmbH, Firmenbuchnr. 88239p, Handelsgericht Wien, DVR 0486809, UID ATU 16351908

Der Austausch von Nachrichten mit oben angefuehrtem Absender via E-Mail dient ausschliesslich Informationszwecken. 
Rechtsgeschaeftliche Erklaerungen duerfen ueber dieses Medium nicht ausgetauscht werden. 
Correspondence with above mentioned sender via e-mail is only for information purposes. This medium may not be used for 
exchange of legally-binding communications.
----------------------------------------



Current thread: