Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update linux/armle/shell_bind_tcp.rb #11885

Merged
merged 1 commit into from May 25, 2019

Conversation

Projects
None yet
4 participants
@iweizime
Copy link
Contributor

commented May 25, 2019

fix a mistake in payloads/singles/linux/armle/shell_bind_tcp.rb

Update shell_bind_tcp.rb
fix a mistake in payloads/singles/linux/armle/shell_bind_tcp.rb

@bcoles bcoles added the payload label May 25, 2019

@bcoles

bcoles approved these changes May 25, 2019

Copy link
Contributor

left a comment

Looks legit

@wvu-r7 wvu-r7 self-assigned this May 25, 2019

@wvu-r7

wvu-r7 approved these changes May 25, 2019

Copy link
Contributor

left a comment

wvu@kharak:/rapid7/metasploit-framework:master$ ./msfvenom -p linux/armle/shell_bind_tcp lhost=127.0.0.1 shell=/system/bin/sh argv0=totally_legit -o shell_bind_tcp.before
/Users/wvu/.rbenv/versions/2.6.2/lib/ruby/gems/2.6.0/gems/activesupport-4.2.11.1/lib/active_support/core_ext/object/duplicable.rb:111: warning: BigDecimal.new is deprecated; use BigDecimal() method instead.
[-] No platform was selected, choosing Msf::Module::Platform::Linux from the payload
[-] No arch selected, selecting arch: armle from the payload
No encoder or badchars specified, outputting raw payload
Payload size: 208 bytes
Saved as: shell_bind_tcp.before
wvu@kharak:/rapid7/metasploit-framework:master$ strings shell_bind_tcp.before
/system/bin/sh
wvu@kharak:/rapid7/metasploit-framework:master$
wvu@kharak:/rapid7/metasploit-framework:HEAD$ ./msfvenom -p linux/armle/shell_bind_tcp lhost=127.0.0.1 shell=/system/bin/sh argv0=totally_legit -o shell_bind_tcp.after
/Users/wvu/.rbenv/versions/2.6.2/lib/ruby/gems/2.6.0/gems/activesupport-4.2.11.1/lib/active_support/core_ext/object/duplicable.rb:111: warning: BigDecimal.new is deprecated; use BigDecimal() method instead.
[-] No platform was selected, choosing Msf::Module::Platform::Linux from the payload
[-] No arch selected, selecting arch: armle from the payload
No encoder or badchars specified, outputting raw payload
Payload size: 208 bytes
Saved as: shell_bind_tcp.after
wvu@kharak:/rapid7/metasploit-framework:HEAD$ strings shell_bind_tcp.after
/system/bin/sh
totally_legit
wvu@kharak:/rapid7/metasploit-framework:HEAD$

Looks legit.

@wvu-r7 wvu-r7 added the bug label May 25, 2019

@wvu-r7 wvu-r7 merged commit 8af7ed9 into rapid7:master May 25, 2019

3 checks passed

Metasploit Automation - Sanity Test Execution Successfully completed all tests.
Details
Metasploit Automation - Test Execution Successfully completed all tests.
Details
continuous-integration/travis-ci/pr The Travis CI build passed
Details

wvu-r7 added a commit that referenced this pull request May 25, 2019

@wvu-r7

This comment has been minimized.

Copy link
Contributor

commented May 25, 2019

Release Notes

This fix modifies the ARGV0 option in the linux/armle/shell_bind_tcp payload so that it specifies an argv[0] in the execve(2) call that spawns SHELL.

msjenkins-r7 added a commit that referenced this pull request May 25, 2019

@tdoan-r7 tdoan-r7 added the rn-fix label Jun 4, 2019

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.