Metasploit mailing list archives
No encoder encoded the buffer.
From: metafan at intern0t.net (MaXe)
Date: Thu, 20 Nov 2008 11:06:16 +0100
Have you tried issueing the following command? info windows/iis/ms02_018_htr And then when you look at the payload size (or whatever it is named), then compare it to the payload that you are using? Because not all exploits has infinite space for the payload, which is why you have to use very simple exploits, thus some needs a little "work" in order to, work. :) If you wonder why there is a space limit, and what it is defined as, the maximum payload size as an integer number are the number of characters in your shell code while the space limit is because the finite sized buffer (if it's an buffer overflow), has a limit on how many characters you can send before it crashes and can't be used for further exploitation. ~ MaXe giuseppe pugliares wrote:
I'm tryng to use shell/reverse_tcp payload with windows/iis/ms02_018_htr exploit, but when i launch exploit i receive this message: No encoder encoded the buffer successfuly. Any idea? Thanks. Giuseppe Pugliares ------------------------------------------------------------------------ _______________________________________________ http://spool.metasploit.com/mailman/listinfo/framework
Current thread:
- No encoder encoded the buffer. giuseppe pugliares (Nov 20)
- No encoder encoded the buffer. MaXe (Nov 20)
- No encoder encoded the buffer. M P Sairam (Nov 20)