routersploit icon indicating copy to clipboard operation
routersploit copied to clipboard

add a robust reverse_tcp shellcode for mipsbe

Open cq674350529 opened this issue 5 years ago • 0 comments

Currently, the reverse_tcp shellcode for mipsbe contains some bad chars like '\x00', which won't work in http requests. I have developed a more robust shellcode and tested it on some real devices. The shellcode avoid some common bad chars ('\x00', '\x20', '\x23', '\x0d\x0a'), and the link on exploit-db is: https://www.exploit-db.com/shellcodes/45541 .

So is it acceptable to add a new mipsbe reverse_tcp shellcode? If yes, replace the original one directly or add a new file called reverse_tcp_xxx.py?

Thanks!

Steps to Reproduce (for bugs)

Your Environment

  • RouterSploit Version used:
  • Operating System and version:
  • Python Version: ( python3 --version )
  • Python Environment: ( python3 -m pip freeze )

Current Behavior

  • If describing a bug, tell us what happens instead of the expected behavior
  • If suggesting a change/improvement, tell us how it works right now

Expected Behavior

  • If you're describing a bug, tell us what should happen
  • If you're suggesting a change/improvement, tell us how it should work

cq674350529 avatar Mar 11 '20 10:03 cq674350529