Exploitation

Good Tutorial

This is without metasploit because anyways the Metasploit Module only supports 64-bit systems. We got a Windows 7 SP1 32-bit Based system.

Steps:

After cloning the github repo, go to the shellcode direcotry and generate the shellcode.

Notice the different shellcode generated.

The one we need is either

scx86.bin or sc_x86_msf.bin

Depending on whether we want to listen on the multi/handler or simple netcat. In my case I ran the exploit with the sc_x86.bin shellcode because I was only looking to use netcat to listen.

Last updated