metasploit-framework/modules/payloads/singles/windows
sinn3r 2c0c732967 Fix #4414 & #4415 - exitfunc and proper null-terminated string
This patch fixes the following for messagebox.rb

Issue 1 (#4415)
When exitfunc is none, the payload will not be able to generate
due to an "invalid opcode" error.

Issue 2: (#4414)
After "user32.dll" is pushed onto the stack for the LoadLibrary
call, the payload does not actually ensure bl is a null byte, it
just assumes it is and uses it to modify the stack to get a
null-terminated string.

Fix #4414
Fix #4415
2014-12-19 03:19:06 -06:00
..
x64 Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
adduser.rb Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
dns_txt_query_exec.rb Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
download_exec.rb Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
exec.rb Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
format_all_drives.rb Slight fixes to grammar/desc/whitespace 2014-12-04 13:11:33 -06:00
loadlibrary.rb Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
messagebox.rb Fix #4414 & #4415 - exitfunc and proper null-terminated string 2014-12-19 03:19:06 -06:00
metsvc_bind_tcp.rb Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
metsvc_reverse_tcp.rb Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
shell_bind_tcp.rb Singles updated from the source 2014-12-13 12:22:07 -06:00
shell_bind_tcp_xpfw.rb Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00
shell_hidden_bind_tcp.rb Singles updated from the source 2014-12-13 12:22:07 -06:00
shell_reverse_tcp.rb Singles updated from the source 2014-12-13 12:22:07 -06:00
speak_pwned.rb Fix up comment splats with the correct URI 2014-10-17 11:47:33 -05:00