Repair 'no encoders encoded the buffer successfully' issues

unstable
sinn3r 2012-04-16 13:42:32 -05:00
parent eedd7be453
commit 1e2203867c
5 changed files with 5 additions and 5 deletions

View File

@ -47,7 +47,7 @@ class Metasploit3 < Msf::Exploit::Remote
}, },
'Payload' => 'Payload' =>
{ {
'Space' => 600, #'Space' => 600,
'BadChars' => "\x00\x0a\x0d\x20%=?\x2f\x5c\x3a\x3d\@;!$", 'BadChars' => "\x00\x0a\x0d\x20%=?\x2f\x5c\x3a\x3d\@;!$",
'EncoderType' => Msf::Encoder::Type::AlphanumMixed, 'EncoderType' => Msf::Encoder::Type::AlphanumMixed,
'DisableNops' => 'True', 'DisableNops' => 'True',

View File

@ -40,7 +40,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Privileged' => true, 'Privileged' => true,
'Payload' => 'Payload' =>
{ {
'Space' => 0x200, #'Space' => 0x200,
'BadChars' => "\x00\x3a\x26\x3f\x25\x23\x20\x0a\x0d\x2f\x2b\x0b\x5c&=+?:;-,/#.\\$%\x1a", 'BadChars' => "\x00\x3a\x26\x3f\x25\x23\x20\x0a\x0d\x2f\x2b\x0b\x5c&=+?:;-,/#.\\$%\x1a",
'Prepend' => 'Prepend' =>
# Disable NX on 2k3 to upload data on the stack # Disable NX on 2k3 to upload data on the stack

View File

@ -47,7 +47,7 @@ class Metasploit3 < Msf::Exploit::Remote
'Privileged' => true, 'Privileged' => true,
'Payload' => 'Payload' =>
{ {
'Space' => 512, #'Space' => 512,
'BadChars' => "\x00\x3a\x26\x3f\x25\x23\x20\x0a\x0d\x2f\x2b\x0b\x5c&=+?:;-,/#.\\$%\x1a", 'BadChars' => "\x00\x3a\x26\x3f\x25\x23\x20\x0a\x0d\x2f\x2b\x0b\x5c&=+?:;-,/#.\\$%\x1a",
'StackAdjustment' => -4096, 'StackAdjustment' => -4096,
}, },

View File

@ -40,7 +40,7 @@ class Metasploit3 < Msf::Exploit::Remote
{ {
'MinNops' => 0, 'MinNops' => 0,
'MaxNops' => 0, 'MaxNops' => 0,
'Space' => 498, #'Space' => 498,
'BadChars' => Rex::Text.charset_exclude(Rex::Text::AlphaNumeric), 'BadChars' => Rex::Text.charset_exclude(Rex::Text::AlphaNumeric),
# clean up to prevent crash on exit # clean up to prevent crash on exit
'Prepend' => Metasm::Shellcode.assemble(Metasm::Ia32.new, "mov dword ptr fs:[0], 0").encode_string, 'Prepend' => Metasm::Shellcode.assemble(Metasm::Ia32.new, "mov dword ptr fs:[0], 0").encode_string,

View File

@ -43,7 +43,7 @@ class Metasploit3 < Msf::Exploit::Remote
}, },
'Payload' => 'Payload' =>
{ {
'Space' => 300, #'Space' => 300,
'BadChars' => "\x00\x0a\x0d:", 'BadChars' => "\x00\x0a\x0d:",
'StackAdjustment' => -3500, 'StackAdjustment' => -3500,
}, },