Files
metasploit-gs/modules/nops/ppc/simple.rb
T

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

61 lines
1.3 KiB
Ruby
Raw Normal View History

##
2017-07-24 06:26:21 -07:00
# This module requires Metasploit: https://metasploit.com/download
2013-10-15 13:50:46 -05:00
# Current source: https://github.com/rapid7/metasploit-framework
##
2005-12-30 04:06:41 +00:00
###
#
# SingleByte
# ----------
#
# This class implements simple NOP generator for PowerPC
#
###
2016-03-08 14:02:44 +01:00
class MetasploitModule < Msf::Nop
2005-12-30 04:06:41 +00:00
def initialize
super(
'Name' => 'Simple',
'Alias' => 'ppc_simple',
'Description' => 'Simple NOP generator',
'Author' => 'hdm',
2006-01-21 22:10:20 +00:00
'License' => MSF_LICENSE,
2005-12-30 04:06:41 +00:00
'Arch' => ARCH_PPC)
register_advanced_options(
[
OptBool.new('RandomNops', [ false, "Generate a random NOP sled", true ])
])
2005-12-30 04:06:41 +00:00
end
def generate_sled(length, opts)
2005-12-30 04:06:41 +00:00
badchars = opts['BadChars'] || ''
random = opts['Random'] || datastore['RandomNops']
if random
2005-12-30 04:06:41 +00:00
1.upto(1024) do |i|
regs_d = (rand(0x8000 - 0x0800) + 0x0800).to_i
regs_b = [regs_d].pack('n').unpack('B*')[0][1, 15]
flag_o = rand(2).to_i
flag_r = rand(2).to_i
2005-12-30 04:06:41 +00:00
pcword = ["011111#{regs_b}#{flag_o}100001010#{flag_r}"].pack("B*")
failed = false
2005-12-30 04:06:41 +00:00
pcword.each_byte do |c|
failed = true if badchars.include?(c.chr)
end
2005-12-30 04:06:41 +00:00
next if failed
2005-12-30 04:06:41 +00:00
return (pcword * (length / 4))[0, length]
end
end
2005-12-30 04:06:41 +00:00
return ("\x60" * length)[0, length]
end
2012-03-18 00:07:27 -05:00
end