Author: j7, Posted: Tue Jan 26, 2010 1:44 am Post subject: Backtrack3 Metasploit /browser/ani_loadimage_chunksize ---- Hi,
I am playing around with BackTrack 3. And I want to try out an IE exploit. The one I am looking at is /browser/ani_loadimage_chunksize. It says it should work on Vista IE7. I have BackTrack3 and a virgin Vista virtual machine both running.
So I right click on the exploit and choose Execute. Then (Automatic) ..., then
/cmd/window/bind_perl.
Then I am asked for the SRVHOST and SRVPORT. I choose 169.254.15.111 and port 8080. This ip is an ip inside my Virtual Box local network. I have assigned this ip to the running BackTrack vm.
Then I choose APPLY. But the module output tab says "Exploit failed: no NOP generator succeeded".
If I am understanding this right, it is starting up a http server page with the exploit and I am to use the VISTA vm Internet Explorer to navigate to it to get exploited. But I have no idea what an NOP generator is ?
Author: mandriva, Location: WAKEFIELDPosted: Tue Jan 26, 2010 12:49 pm Post subject: ---- You should be using SE's to find answers, it's the best way, also if you are going to run an exploit at least know what it is going to do. i suggest you read this for starters http://en.wikipedia.org/wiki/Buffer_overflow
Author: j7, Posted: Sat Jan 30, 2010 12:03 am Post subject: ---- oh. NOP = noop sled. My previous book calls it noop sled.
So the generator failed. I guess I will just blindly try other payloads. There's not much info to go on as to why it failed.