Router-Exploit-Shovel: An Automated Application Generator For Stack Overflow Types On Wireless Routers
About Router-Exploit-Shovel
Router-Exploit-Shovel is an automated application generation for Stack Overflow types on Wireless Routers.
Router exploits shovel is an automated application generation tool for stack overflow types on wireless routers. The tool implements the key functions of exploits, it can adapt to the length of the data padding on the stack, generate the ROP chain, generate the encoded shellcode, and finally assemble them into a complete attack code. The user only needs to attach the attack code to the overflow location of the POC to complete the Exploit of the remote code execution.
The tool supports MIPSel and MIPSeb.Run on Ubuntu 16.04 64bit.
Router-Exploit-Shovel's Installation
Open your Terminal and enter these commands:
Usage
Example:
Router-Exploit-Shovel's screenshot
Code structure
ROP chain generation
This tool uses pattern to generate ROP chains. Extract patterns from common ROP exploitation procedure. Use regex matching to find available gadgets to fill up chain strings. Base64 encoding is to avoid duplicate character escapes. For example:
Attackblocks
You can get attackblocks generated in results/attackBlocks.txt. Such as:
You might like these similar tools:
Router-Exploit-Shovel is an automated application generation for Stack Overflow types on Wireless Routers.
Router exploits shovel is an automated application generation tool for stack overflow types on wireless routers. The tool implements the key functions of exploits, it can adapt to the length of the data padding on the stack, generate the ROP chain, generate the encoded shellcode, and finally assemble them into a complete attack code. The user only needs to attach the attack code to the overflow location of the POC to complete the Exploit of the remote code execution.
The tool supports MIPSel and MIPSeb.Run on Ubuntu 16.04 64bit.
Router-Exploit-Shovel's Installation
Open your Terminal and enter these commands:
Usage
Example:
python3 Router_Exploit_Shovel.py -b test_binaries/mipseb-httpd -l test_binaries/libuClibc-0.9.30.so -o 0x00478584
Router-Exploit-Shovel's screenshot
Code structure
ROP chain generation
This tool uses pattern to generate ROP chains. Extract patterns from common ROP exploitation procedure. Use regex matching to find available gadgets to fill up chain strings. Base64 encoding is to avoid duplicate character escapes. For example:
Attackblocks
You can get attackblocks generated in results/attackBlocks.txt. Such as:
You might like these similar tools:
- eXpliot - Internet Of Things Exploitation Framework
- RouterSploit: Exploitation Framework for Embedded Devices
Related news
- Hacking Tools Online
- Hacker Search Tools
- Hacker Techniques Tools And Incident Handling
- Hack Tools Pc
- Hack Tools For Mac
- Hacker Tools Apk Download
- Hacking Tools Mac
- Pentest Tools For Windows
- Hacking Tools 2019
- Hacking Tools For Windows 7
- How To Install Pentest Tools In Ubuntu
- Hacker Tools Windows
- Pentest Tools Review
- How To Hack
- Github Hacking Tools
- Pentest Tools Linux
- Pentest Reporting Tools
- New Hacker Tools
- Pentest Tools Android
- Hack Website Online Tool
- Hack Tools 2019
- Hacker Tools Mac
- Hacking Apps
- Best Hacking Tools 2020
- Hacker Tools Free Download
- Pentest Tools Kali Linux
- Tools Used For Hacking
- Hack Tools For Pc
- Hacking Tools For Mac
- Hacking Tools Free Download
- Wifi Hacker Tools For Windows
- Hack Tools For Windows
- Hacking Tools Usb
- Hacking Tools Windows 10
- Hacker Tools Mac
- Hacking Tools For Mac
- Hacking Tools And Software
- Pentest Tools Alternative
- Blackhat Hacker Tools
- Hacking Tools Software
- Hacker Techniques Tools And Incident Handling
- Hack Website Online Tool
- Hacking Tools Mac
- Pentest Tools Free
- Pentest Tools Url Fuzzer
- Hacking Tools And Software
- Pentest Tools Framework
- Pentest Tools Framework
- Hacker Tools Linux
- Pentest Tools For Windows
- Pentest Tools Online
- New Hack Tools
- Hacker Tool Kit
- Pentest Recon Tools
- Beginner Hacker Tools
- Hacking Tools 2019
- Best Hacking Tools 2019
- What Are Hacking Tools
- Hacking Tools For Windows
- Pentest Tools List
- Pentest Tools Website Vulnerability
- What Is Hacking Tools
- Hacker Tools
- Pentest Tools Url Fuzzer
- Pentest Tools Download
- Pentest Tools Subdomain
- Hacking Tools For Pc
- Hacks And Tools
- How To Install Pentest Tools In Ubuntu
- Hacking Tools Hardware
- Hacker Tools Mac
- Pentest Tools Review
- Hacker Tools Free Download
- Bluetooth Hacking Tools Kali
- Hack Website Online Tool
- Hacker Tools Free
- Blackhat Hacker Tools
- Hacking Tools And Software
- Computer Hacker
- Hack App
- Wifi Hacker Tools For Windows
- Hack Tool Apk No Root
- Pentest Tools For Mac
- Hacker Tools List
- Hacking Tools For Beginners
- Hacker Tools Free
- Top Pentest Tools
- Usb Pentest Tools
- Hack Tools Pc
- Hacking Tools 2019
- Growth Hacker Tools
- Hacker Security Tools
- Hacker Tools For Mac
- Pentest Tools Website Vulnerability
- Hacking Tools For Pc
- Nsa Hack Tools
- Hack Tools 2019
- Hacking Tools Online
- Hacking Tools For Games
- Tools Used For Hacking
- Beginner Hacker Tools
- Pentest Tools For Windows
- Hacking Tools Github
- Tools For Hacker
- Hacking Tools Name
- Hacking Tools For Windows
- Kik Hack Tools
- Tools 4 Hack
- Hacking Tools Free Download
- Hack Tools Download
- Pentest Tools Alternative
- Hacker Tools Windows
- Hacking Tools For Kali Linux
- Pentest Tools Website
- Hack Tools Pc
- Pentest Tools Find Subdomains
- Hack Tools For Pc
- Underground Hacker Sites
- Hack Tools For Ubuntu
- Hacks And Tools
- Hacker Techniques Tools And Incident Handling
- Hacking Tools For Games
- Pentest Tools For Mac
- Pentest Tools Tcp Port Scanner
- Pentest Tools For Mac
Comments