Router-Exploit-Shovel is an automated application generation for Stack Overflow types on Wireless Routers.
Router exploits shovel is an automated application generation tool for stack overflow types on wireless routers. The tool implements the key functions of exploits, it can adapt to the length of the data padding on the stack, generate the ROP chain, generate the encoded shellcode, and finally assemble them into a complete attack code. The user only needs to attach the attack code to the overflow location of the POC to complete the Exploit of the remote code execution.
The tool supports MIPSel and MIPSeb.Run on Ubuntu 16.04 64bit.
Router-Exploit-Shovel's Installation
Open your Terminal and enter these commands:
Usage
Example:
python3 Router_Exploit_Shovel.py -b test_binaries/mipseb-httpd -l test_binaries/libuClibc-0.9.30.so -o 0x00478584
Router-Exploit-Shovel's screenshot
Code structure
ROP chain generation
This tool uses pattern to generate ROP chains. Extract patterns from common ROP exploitation procedure. Use regex matching to find available gadgets to fill up chain strings. Base64 encoding is to avoid duplicate character escapes. For example:
Attackblocks
You can get attackblocks generated in results/attackBlocks.txt. Such as:
You might like these similar tools:
- eXpliot - Internet Of Things Exploitation Framework
- RouterSploit: Exploitation Framework for Embedded Devices
- Pentest Tools Url Fuzzer
- Beginner Hacker Tools
- Hacking Tools For Games
- Growth Hacker Tools
- Hackers Toolbox
- Nsa Hack Tools Download
- Hack Tools Online
- Growth Hacker Tools
- Hacking Tools Name
- Hacking Tools Hardware
- Hacking Tools For Windows
- Hacking Tools Download
- Wifi Hacker Tools For Windows
- Hak5 Tools
- Best Hacking Tools 2020
- Hack Tools 2019
- Hacking Tools Hardware
- Underground Hacker Sites
- Hacking Tools For Beginners
- Hacking Tools For Windows Free Download
- Hacking Apps
- Hacking Tools Hardware
- Hacking Tools For Windows
- Hacker Tools
- Hacking Tools For Mac
- Tools 4 Hack
- Physical Pentest Tools
No hay comentarios:
Publicar un comentario