You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently, the reverse_tcp shellcode for mipsbe contains some bad chars like '\x00', which won't work in http requests. I have developed a more robust shellcode and tested it on some real devices. The shellcode avoid some common bad chars ('\x00', '\x20', '\x23', '\x0d\x0a'), and the link on exploit-db is: https://www.exploit-db.com/shellcodes/45541 .
So is it acceptable to add a new mipsbe reverse_tcp shellcode? If yes, replace the original one directly or add a new file called reverse_tcp_xxx.py?
Thanks!
Steps to Reproduce (for bugs)
Your Environment
RouterSploit Version used:
Operating System and version:
Python Version: ( python3 --version )
Python Environment: ( python3 -m pip freeze )
Current Behavior
If describing a bug, tell us what happens instead of the expected behavior
If suggesting a change/improvement, tell us how it works right now
Expected Behavior
If you're describing a bug, tell us what should happen
If you're suggesting a change/improvement, tell us how it should work
The text was updated successfully, but these errors were encountered:
Currently, the reverse_tcp shellcode for mipsbe contains some bad chars like '\x00', which won't work in http requests. I have developed a more robust shellcode and tested it on some real devices. The shellcode avoid some common bad chars (
'\x00', '\x20', '\x23', '\x0d\x0a'
), and the link on exploit-db is: https://www.exploit-db.com/shellcodes/45541 .So is it acceptable to add a new mipsbe reverse_tcp shellcode? If yes, replace the original one directly or add a new file called
reverse_tcp_xxx.py
?Thanks!
Steps to Reproduce (for bugs)
Your Environment
python3 --version
)python3 -m pip freeze
)Current Behavior
Expected Behavior
The text was updated successfully, but these errors were encountered: