Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

add a robust reverse_tcp shellcode for mipsbe #656

Open
cq674350529 opened this issue Mar 11, 2020 · 0 comments
Open

add a robust reverse_tcp shellcode for mipsbe #656

cq674350529 opened this issue Mar 11, 2020 · 0 comments

Comments

@cq674350529
Copy link

Currently, the reverse_tcp shellcode for mipsbe contains some bad chars like '\x00', which won't work in http requests. I have developed a more robust shellcode and tested it on some real devices. The shellcode avoid some common bad chars ('\x00', '\x20', '\x23', '\x0d\x0a'), and the link on exploit-db is: https://www.exploit-db.com/shellcodes/45541 .

So is it acceptable to add a new mipsbe reverse_tcp shellcode? If yes, replace the original one directly or add a new file called reverse_tcp_xxx.py?

Thanks!

Steps to Reproduce (for bugs)

Your Environment

  • RouterSploit Version used:
  • Operating System and version:
  • Python Version: ( python3 --version )
  • Python Environment: ( python3 -m pip freeze )

Current Behavior

  • If describing a bug, tell us what happens instead of the expected behavior
  • If suggesting a change/improvement, tell us how it works right now

Expected Behavior

  • If you're describing a bug, tell us what should happen
  • If you're suggesting a change/improvement, tell us how it should work
# for free to join this conversation on GitHub. Already have an account? # to comment
Projects
None yet
Development

No branches or pull requests

2 participants