Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add a robust reverse_tcp shellcode for mipsbe #656

Open
cq674350529 opened this issue Mar 11, 2020 · 0 comments
Open

add a robust reverse_tcp shellcode for mipsbe #656

cq674350529 opened this issue Mar 11, 2020 · 0 comments

Comments

@cq674350529
Copy link

Currently, the reverse_tcp shellcode for mipsbe contains some bad chars like '\x00', which won't work in http requests. I have developed a more robust shellcode and tested it on some real devices. The shellcode avoid some common bad chars ('\x00', '\x20', '\x23', '\x0d\x0a'), and the link on exploit-db is: https://www.exploit-db.com/shellcodes/45541 .

So is it acceptable to add a new mipsbe reverse_tcp shellcode? If yes, replace the original one directly or add a new file called reverse_tcp_xxx.py?

Thanks!

Steps to Reproduce (for bugs)

Your Environment

  • RouterSploit Version used:
  • Operating System and version:
  • Python Version: ( python3 --version )
  • Python Environment: ( python3 -m pip freeze )

Current Behavior

  • If describing a bug, tell us what happens instead of the expected behavior
  • If suggesting a change/improvement, tell us how it works right now

Expected Behavior

  • If you're describing a bug, tell us what should happen
  • If you're suggesting a change/improvement, tell us how it should work
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants