Closed papahjahat closed 7 years ago
does that happen with every exe you try , or just a particular executable .
test it with putty.exe in PE folder of fatrat if you get the same issue . around here everything is working fine . https://s24.postimg.org/p8ihbmw9x/024.png https://s18.postimg.org/tyotlbit5/025.png
If you going to reply , then write all the steps and options you took until you get that error .
btw , option 5 does not use backdoor factory , only option 4 like in images before .
[] In the backdoor module [] Checking if binary is supported [] Gathering file info [] Reading win32 entry instructions [] Looking for and setting selected shellcode [] Creating win32 resume execution stub Traceback (most recent call last): File "/usr/share/backdoor-factory/backdoor.py", line 62, in
class bdfMain():
File "/usr/share/backdoor-factory/backdoor.py", line 610, in bdfMain
result = supported_file.run_this()
File "/usr/share/backdoor-factory/pebin.py", line 168, in run_this
return self.patch_pe()
File "/usr/share/backdoor-factory/pebin.py", line 1799, in patchpe
, self.flItms['resumeExe'] = targetFile.resume_execution_32()
File "/usr/share/backdoor-factory/intel/intelCore.py", line 340, in resume_execution_32
CallValue = int(CallValue, 16)
ValueError: invalid literal for int() with base 16: 'dword ptr [0x402000]'
Shell Saved To /backdoored/output/ press any key to continue