routersploit
routersploit copied to clipboard
add a robust reverse_tcp shellcode for mipsbe
Currently, the reverse_tcp shellcode for mipsbe contains some bad chars like '\x00', which won't work in http requests. I have developed a more robust shellcode and tested it on some real devices. The shellcode avoid some common bad chars ('\x00', '\x20', '\x23', '\x0d\x0a'), and the link on exploit-db is: https://www.exploit-db.com/shellcodes/45541 .
So is it acceptable to add a new mipsbe reverse_tcp shellcode? If yes, replace the original one directly or add a new file called reverse_tcp_xxx.py?
Thanks!
Steps to Reproduce (for bugs)
Your Environment
- RouterSploit Version used:
- Operating System and version:
- Python Version: (
python3 --version) - Python Environment: (
python3 -m pip freeze)
Current Behavior
- If describing a bug, tell us what happens instead of the expected behavior
- If suggesting a change/improvement, tell us how it works right now
Expected Behavior
- If you're describing a bug, tell us what should happen
- If you're suggesting a change/improvement, tell us how it should work