Metasploit mailing list archives

Re: Unsuccessful connection after successful exploit


From: Patrick Webster <patrick () aushack com>
Date: Fri, 12 Feb 2010 17:20:27 +1100

Depends on what you're attacking, but I had a similar issue with my NTP module.

I had to add:

'PrependEncoder' => Metasm::Shellcode.assemble(Metasm::Ia32.new, "xor
eax,eax mov al,27 int 0x80").encode_string, # alarm(0)

to prevent the NTP timer from killing the fork thereby leaving the
payload running. Strace is your friend >:)

-Patrick
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: