From a8198bc948fbbffcefbd2d1fc0dc71db082fd7d9 Mon Sep 17 00:00:00 2001 From: jvazquez-r7 Date: Mon, 16 Sep 2013 11:55:30 -0500 Subject: [PATCH] Add documentatio to the mixin --- lib/msf/core/exploit/cmdstager_echo.rb | 16 ++++++++++++---- 1 file changed, 12 insertions(+), 4 deletions(-) diff --git a/lib/msf/core/exploit/cmdstager_echo.rb b/lib/msf/core/exploit/cmdstager_echo.rb index 5222db3a98..d6c78b68a6 100644 --- a/lib/msf/core/exploit/cmdstager_echo.rb +++ b/lib/msf/core/exploit/cmdstager_echo.rb @@ -4,15 +4,23 @@ require 'msf/core/exploit/cmdstager' module Msf -### +#### +# Allows for staging cmd to arbitrary payloads through the CmdStagerEcho. # -# This mixin provides an interface for staging cmd to arbitrary payloads -# -### +# This stager uses the echo's "-e" flag, that enable interpretation of +# backslash escapes, to drop an ELF with the payload embedded to disk. +# The "-e" flag is usually available on linux environments. This stager +# has been found useful on restricted linux based embedded devices. +#### + module Exploit::CmdStagerEcho include Msf::Exploit::CmdStager + # Initializes a CmdStagerEcho instance for the supplied payload + # + # @param exe [String] The payload embedded into an ELF + # @return [Rex::Exploitation::CmdStagerEcho] Stager instance def create_stager(exe) Rex::Exploitation::CmdStagerEcho.new(exe) end