Closed simonla82 closed 10 months ago
I'm not sure if this functionality already exists in the Python support or not; but it would be very easy to migrate this to be written using Ruby if any help is needed :+1:
Hi!
This issue has been left open with no activity for a while now.
We get a lot of issues, so we currently close issues after 60 days of inactivity. It’s been at least 30 days since the last update here. If we missed this issue or if you want to keep it open, please reply here. You can also add the label "not stale" to keep this issue open!
As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request.
Hi again!
It’s been 60 days since anything happened on this issue, so we are going to close it. Please keep in mind that I’m only a robot, so if I’ve closed this issue in error please feel free to reopen this issue or create a new one if you need anything else.
As a friendly reminder: the best way to see this issue, or any other, fixed is to open a Pull Request.
Summary
I try to specify bad characters for the payload in an external Python module of type
remote_exploit
. However, I can't get it to work and, thus, the payload contains bad characters.Relevant information
The exploit I am trying to build in a module is for the vulnserver application. Currently my code is:
And in principle, the exploit is working. If I replace
shellcode
with the output ofmsfvenom -p windows/meterpreter/bind_tcp --format py --bad-chars '\x00'
, I can successfully spawn a Meterpreter session. However, I would like the shellcode to be generated dynamically according to the configured payload and not hard-code it. If I do that, i.e., execute the code as is,payload_encoded
gives a payload that contains\x00
bytes, as the output oflogging.info(ret_address + nop_sled + shellcode)
shows:So, how can I specify bad characters in an external Python module?
Any help is highly appreciated!