Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update linux/armle/shell_bind_tcp.rb #11885

Merged
merged 1 commit into from May 25, 2019
Merged

Update linux/armle/shell_bind_tcp.rb #11885

merged 1 commit into from May 25, 2019

Conversation

iweizime
Copy link
Contributor

fix a mistake in payloads/singles/linux/armle/shell_bind_tcp.rb

fix a mistake in payloads/singles/linux/armle/shell_bind_tcp.rb
@bcoles bcoles added the payload label May 25, 2019
Copy link
Contributor

@bcoles bcoles left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks legit

@wvu wvu self-assigned this May 25, 2019
Copy link
Contributor

@wvu wvu left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

wvu@kharak:/rapid7/metasploit-framework:master$ ./msfvenom -p linux/armle/shell_bind_tcp lhost=127.0.0.1 shell=/system/bin/sh argv0=totally_legit -o shell_bind_tcp.before
/Users/wvu/.rbenv/versions/2.6.2/lib/ruby/gems/2.6.0/gems/activesupport-4.2.11.1/lib/active_support/core_ext/object/duplicable.rb:111: warning: BigDecimal.new is deprecated; use BigDecimal() method instead.
[-] No platform was selected, choosing Msf::Module::Platform::Linux from the payload
[-] No arch selected, selecting arch: armle from the payload
No encoder or badchars specified, outputting raw payload
Payload size: 208 bytes
Saved as: shell_bind_tcp.before
wvu@kharak:/rapid7/metasploit-framework:master$ strings shell_bind_tcp.before
/system/bin/sh
wvu@kharak:/rapid7/metasploit-framework:master$
wvu@kharak:/rapid7/metasploit-framework:HEAD$ ./msfvenom -p linux/armle/shell_bind_tcp lhost=127.0.0.1 shell=/system/bin/sh argv0=totally_legit -o shell_bind_tcp.after
/Users/wvu/.rbenv/versions/2.6.2/lib/ruby/gems/2.6.0/gems/activesupport-4.2.11.1/lib/active_support/core_ext/object/duplicable.rb:111: warning: BigDecimal.new is deprecated; use BigDecimal() method instead.
[-] No platform was selected, choosing Msf::Module::Platform::Linux from the payload
[-] No arch selected, selecting arch: armle from the payload
No encoder or badchars specified, outputting raw payload
Payload size: 208 bytes
Saved as: shell_bind_tcp.after
wvu@kharak:/rapid7/metasploit-framework:HEAD$ strings shell_bind_tcp.after
/system/bin/sh
totally_legit
wvu@kharak:/rapid7/metasploit-framework:HEAD$

Looks legit.

@wvu wvu added the bug label May 25, 2019
@wvu wvu merged commit 8af7ed9 into rapid7:master May 25, 2019
wvu added a commit that referenced this pull request May 25, 2019
@wvu
Copy link
Contributor

wvu commented May 25, 2019

Release Notes

This fix modifies the ARGV0 option in the linux/armle/shell_bind_tcp payload so that it specifies an argv[0] in the execve(2) call that spawns SHELL.

@tdoan-r7 tdoan-r7 added the rn-fix release notes fix label Jun 4, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug payload rn-fix release notes fix
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants