Metasploit mailing list archives

Encoding Payloads


From: Tommy Elliott <t.ellio.09 () gmail com>
Date: Wed, 10 Nov 2010 09:32:04 -0600

Got a quick question that hopefully I can get some guidance with.  Below is
an excerpt from the Metasploit Free Ebook download about *msfencode*:

What Are Bad Characters?
Many applications perform some sort of filtering on the input they receive.
For
instance, a Web server might preprocess Unicode characters before they are
sent on
to the vulnerable piece of code. As a result, the payload might get modified
and may
not function as expected. Some characters also end up terminating strings,
such as the
NULL (0x00) byte. These must also be avoided.

To determine what characters are being pre-processed, a whole array of all
pos-
sible characters could be sent, and it could then be determined which ones
were mod-
ified. Another way to do this would be to make assumptions about the
characters that
that type of an application typically modifies and avoid using those.

My first question is with the first sentence. When it is stated you pass a
whole array of all possible characters that can be sent, *how* is it that
you determine which ones were modified after the application has received
them.

My second question is, believe it or not!, with the second sentence. Is
there some kind of master list or more expedited way of making an assumption
about what characters certain applications most like modify/avoid? I
understand that '0x00' is a NULL character but what other assumptions would
normally be made?

If these questions involve lengthy answers that you think I may need more
guidance than a single reply then please feel free to simply point me in the
right direction! ;)


Thanks in advance,

Tommy
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

Current thread: