rapid7/metasploit-framework

View on GitHub
external/source/exploits/cve-2010-4452/get_offsets.rb

Summary

Maintainability
A
0 mins
Test Coverage
#!/usr/bin/env ruby

dat = nil
dat = File.open(ARGV[0], 'rb') { |fd| fd.read }
if dat 
    puts "config_off = 0x%x" % dat.index("\x00\x08CONFIGZZ")
    puts "cn_off = 0x%x" % dat.index("\x00\x07AppletX")
else
    "No data?!"
end