#!/usr/bin/python
#Port bind exploit for apple quicktime rtsp vulnerability
#Tested on windows 2000 SP0 and SP4 with quicktime 713100 Should be easy
#to port the exploit to others All one needs to do is look for the appropriate
#jump address Certain characters are not permitted in the shellcode
#Alphanumeric shellcodes work fine
#This scrip ...
#!/usr/bin/ruby
# Copyright (c) LMH <lmh [at] info-pullcom>
# Kevin Finisterre <kf_lists [at] digitalmunitioncom>
#
# Notes:
# Our command string is loaded on memory at a static address normally,
# but this depends on execution method and the string length The address set in this exploit will
# be likely successful if w ...
##
# $Id: apple_quicktime_rtsprb 9220 2010-05-04 23:09:32Z jduck $
##
##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions Please see the Metasploit
# Framework web site for more information on licensing and terms of use
# metasploitcom/framework/
##
require 'msf/core'
c ...