Re: Linux restricted ASCII Shellcode


Here you have you shellcode in ascii format.


If the code you are trying to exploit does NOT allow nonASCII nops (that
actually is the only thing that makes sence) instead of '\x90' you will
have to use some ascii opcode/bytecode string that can be used as NOP
sled (for example 'A' -> inc ecx).


nonexistant@xxxxxxxxxx wrote:
Yes I'm having a seg-fault, but I can't catch you...

AFAIK when EIP is pointing somewhere in the NOP sled, no matter how the shellcode is aligned... Alignment has nothing to do here...?¿? I'm wrong?

More over, I've tryed more than 5 different ASCII shellcodes all with the same result... Always segfaulting. It looks as if shellcodes where not working for any common reason...

So, summarizing:

1.- I can perfectly overwrite RET thus having EIP pointing almost 100% of the time to the NOP's of my shellcode (in an environment variable)

2.- My -non-ascii- shellcode works perfectly

3.- Whn I try with ANY pure ascii shellcode, it fails 100% of the time.

What is happening?

I've tryed with pure ASCII shellcodes ripped from among others...

Metasploit framework failed to convert the original shellcode -the one that works- to pure ascii with the selected charset (A-Z,a-z,0-9).

That's the original shellcode:


Is anyone able to convert this to pure ASCII or giving me a working pure ASCII shellcode or helping me understand why all the pure ascii shellcodes are failing in my exploit?

Thank you,

Sergio Alvarez
Security, Research & Development
IT Security Consultant
email: shadown@xxxxxxxxx

This message is confidential. It may also contain information that is
privileged or otherwise legally exempt from disclosure. If you have
received it by mistake please let us know by e-mail immediately and
delete it from your system; should also not copy the message nor
disclose its contents to anyone. Many thanks.

Relevant Pages