Vuln Dev
creating a "cc" opcode from ASCII shell code Jun 22 2007 09:58AM
Aaron Adams (aadams securityfocus com) (3 replies)
Re: creating a "cc" opcode from ASCII shell code Jun 23 2007 12:09AM
Dude VanWinkle (dudevanwinkle gmail com)
Re: creating a "cc" opcode from ASCII shell code Jun 22 2007 10:02PM
H D Moore (sflist digitaloffense net)
The alpha/unicode payload in Metasploit require you to specify a register
that points to the code, or, failing that, use a SEH-based GetPC stub.

Metasploit 3 now supports email delivery, check out the email version of
the ANI exploit under:

http://preview.tinyurl.com/yobm88

This code demonstrates sending an email message via SMTP and has full
support for MIME parts.

Finding alphanumeric return addresses is difficult. You can try searching
for opcodes using memdump.exe/msfpescan or ollydbg/windbg, but its still
going to be painful.

If you do decide to use Metasploit for the exploit, one thing you get "for
free" is the ability preprend "\xcc" before your decoded shellcode. Just
add a 'Prepend' => "\xcc" into the Payload block of the module.

Good luck!

-HD

On Friday 22 June 2007 04:58, Aaron Adams wrote:
> I tried using the Metasploit "shell code" generator
> and failed.   Also - there is no means of delivery via
> Metasploit so I gave up on using it.

[ reply ]
Re: creating a "cc" opcode from ASCII shell code Jun 22 2007 06:20PM
Valdis Kletnieks vt edu


 

Privacy Statement
Copyright 2010, SecurityFocus