[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: creating a "cc" opcode from ASCII shell code
The alpha/unicode payload in Metasploit require you to specify a register
that points to the code, or, failing that, use a SEH-based GetPC stub.
Metasploit 3 now supports email delivery, check out the email version of
the ANI exploit under:
This code demonstrates sending an email message via SMTP and has full
support for MIME parts.
Finding alphanumeric return addresses is difficult. You can try searching
for opcodes using memdump.exe/msfpescan or ollydbg/windbg, but its still
going to be painful.
If you do decide to use Metasploit for the exploit, one thing you get "for
free" is the ability preprend "\xcc" before your decoded shellcode. Just
add a 'Prepend' => "\xcc" into the Payload block of the module.
On Friday 22 June 2007 04:58, Aaron Adams wrote:
> I tried using the Metasploit "shell code" generator
> and failed. Also - there is no means of delivery via
> Metasploit so I gave up on using it.