From 44585bcf45ddb379141e133abc7a60b18bfea402 Mon Sep 17 00:00:00 2001 From: A5t4t1ne <62953863+A5t4t1ne@users.noreply.github.com> Date: Mon, 9 Dec 2024 11:33:35 +0100 Subject: [PATCH] add comment --- modules/encoders/aarch64/nonnull.rb | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/modules/encoders/aarch64/nonnull.rb b/modules/encoders/aarch64/nonnull.rb index 7e501515b99d..db5a3bd4a1c1 100644 --- a/modules/encoders/aarch64/nonnull.rb +++ b/modules/encoders/aarch64/nonnull.rb @@ -1,6 +1,8 @@ ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework +# +# This module was developed during a semester projecter under the supervision of the CYD campus. ## class MetasploitModule < Msf::Encoder @@ -10,7 +12,8 @@ def initialize super( 'Name' => 'AArch64 null-byte encoder', 'Description' => %q{ - Output is guaranteed to be NULL-byte free. + This encoder produces an output that is guaranteed to be NULL-byte free. + Max payload size is 4136 Bytes. }, 'Author' => 'A5t4t1ne', 'Arch' => ARCH_AARCH64, @@ -81,7 +84,6 @@ def min_jmp_back(enc_buf) bytes_to_fill = val[1] - enc_buf.length nops = (bytes_to_fill / 4) - 16 # loop lbl is 16 instructions above buffer - puts("nops: #{nops}, max size: #{val[0]}, buflen: #{enc_buf.length}") return [val[2], "\x1f\x20\x03\xd5" * nops, val[3], val[4]] end