From f927d1d7d366fb4d2374b203eb59752947fe90f6 Mon Sep 17 00:00:00 2001 From: Ruslaideemin Date: Fri, 2 Aug 2013 09:06:20 +1000 Subject: [PATCH] Increase exploit reliability From some limited testing, it appears that this exploit is missing \x0d\x0a in the bad chars. If the generated payload / hunter or egg contain that combination, it seems to cause reliability issues and exploitation fails. The home page for this software can be found at http://www.leighb.com/intrasrv.htm --- modules/exploits/windows/http/intrasrv_bof.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/windows/http/intrasrv_bof.rb b/modules/exploits/windows/http/intrasrv_bof.rb index 41861f0ea4..e22018dd3a 100644 --- a/modules/exploits/windows/http/intrasrv_bof.rb +++ b/modules/exploits/windows/http/intrasrv_bof.rb @@ -39,7 +39,7 @@ class Metasploit3 < Msf::Exploit::Remote { 'Space' => 4660, 'StackAdjustment' => -3500, - 'BadChars' => "\x00" + 'BadChars' => "\x00\x0d\x0a" }, 'DefaultOptions' => {