Metasploit mailing list archives

Rép. : Re: [framework] Question about a Brigthstore exploit


From: francis.provencher at msp.gouv.qc.ca (FRANCIS PROVENCHER)
Date: Fri, 14 Sep 2007 08:52:30 -0400

Thanks H.D for the information!
 
Francis Provencher
Minist?re de la S?curit? publique du Qu?bec
Direction des technologies de l'information
Division de la s?curit? informatique
T?l: 1 418 646-3258
Courriel:   Francis.provencher at Msp.gouv.qc.ca 
 
CEH - Certified Ethical Hackers
SSCP - System Security Certified Practitionner
Sec+ - Security +

hdm at metasploit.com 13/9/2007 15:38 >>>

No encoder was able to transform your payload in a way that met the 
criteria for the exploit. The solution is to pick a smaller or
different 
payload. For example, try the reverse payload ending in "ord".

-HD

On Thursday 13 September 2007 14:25, FRANCIS PROVENCHER wrote:
What can cause this error? I never see it before.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070914/d125a314/attachment.htm>
-------------- next part --------------
An embedded and charset-unspecified text was scrubbed...
Name: FRANCIS PROVENCHER4.vcf
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070914/d125a314/attachment.asc>


Current thread: