pwn 0.5.2 → 0.5.3

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 2c00a83379a700092db7c7216a4512822ac070975c5af3311de7727c1348894e
4
- data.tar.gz: 298645aed83ccec72c6bf7d9ed3aa956a04a66277aaf964a380a313f5c815e8f
3
+ metadata.gz: 23bb25690e9f35296d04db4e6fbeaa297e15d86cad02b8329b740f00fa8e0032
4
+ data.tar.gz: df62daebc188a98c48fca439f86d58418a29fdc8bf0b7cd38fcf3debb858d82e
5
5
  SHA512:
6
- metadata.gz: 9836240965a052fa5d018b60af85dfd7484428f5c5d0e809fad9950d206b5ac2ee39552b624785e819c0d057e9563fd47beb0d18f87258226ba6d97275a3819b
7
- data.tar.gz: 971a59c78d6a25ab4b2406e416de1b90ee0e8cb9c91a0e098c0ae936336c06acc061868ff396a2e1328fba260a12a1693ae7c66251213e508cfdbb7fb12fe6c4
6
+ metadata.gz: d3f464f188dd4c0e04982b0e4d61f7b45e4afa4b028b01de37ca834fe53b49edaff0369a40d975c855c8432b09021e13d1200dbbbd30a039006b96542d534f26
7
+ data.tar.gz: 5984d6629d44b1c12cd09f5c811a9c238fb302b72b6b6964dc440f9ddf77accc2756ce746d7488b8fc1c7dce835bc18b432c9dba3e50300f1627236c12065628
data/README.md CHANGED
@@ -37,7 +37,7 @@ $ cd /opt/pwn
37
37
  $ ./install.sh
38
38
  $ ./install.sh ruby-gem
39
39
  $ pwn
40
- pwn[v0.5.2]:001 >>> PWN.help
40
+ pwn[v0.5.3]:001 >>> PWN.help
41
41
  ```
42
42
 
43
43
  [![Installing the pwn Security Automation Framework](https://raw.githubusercontent.com/0dayInc/pwn/master/documentation/pwn_install.png)](https://youtu.be/G7iLUY4FzsI)
@@ -52,7 +52,7 @@ $ rvm use ruby-3.3.0@pwn
52
52
  $ gem uninstall --all --executables pwn
53
53
  $ gem install --verbose pwn
54
54
  $ pwn
55
- pwn[v0.5.2]:001 >>> PWN.help
55
+ pwn[v0.5.3]:001 >>> PWN.help
56
56
  ```
57
57
 
58
58
  If you're using a multi-user install of RVM do:
@@ -62,7 +62,7 @@ $ rvm use ruby-3.3.0@pwn
62
62
  $ rvmsudo gem uninstall --all --executables pwn
63
63
  $ rvmsudo gem install --verbose pwn
64
64
  $ pwn
65
- pwn[v0.5.2]:001 >>> PWN.help
65
+ pwn[v0.5.3]:001 >>> PWN.help
66
66
  ```
67
67
 
68
68
  PWN periodically upgrades to the latest version of Ruby which is reflected in `/opt/pwn/.ruby-version`. The easiest way to upgrade to the latest version of Ruby from a previous PWN installation is to run the following script:
@@ -100,31 +100,31 @@ module PWN
100
100
  # INFO: hit breakpoint at: 0x562e8547d139
101
101
  # [0x562e8547d139]> db
102
102
  # ```
103
- # 2. Populate start_addr w/ address (i.e. '0x562e8547d139') of a known function (e.g. main)
104
- # 3. Step down to the instruction you want to set a breakpoint. Record its address...
103
+ # 2. Populate start_addr w/ address (i.e. '0x562e8547d139') of a known function (i.e. main)
104
+ # 3. Step down to the instruction where you want to set a breakpoint. Record its address...
105
105
  # this is the target_addr.
106
106
  # ```
107
107
  # [0x562e8547d139]> v
108
- # <step through to target instruction via F7/F8>
108
+ # <step through to the target instruction via F7/F8>
109
109
  # ```
110
- # 4. Get the hex offset value by calling this method
110
+ # 4. Get the hex offset value by calling PWN::Plugins::XXD.calc_addr_offset method
111
111
  # 5. Future breakpoints can be calculated by adding the hex offset to the
112
112
  # updated start_addr (which changes every time the binary is executed).
113
- # If the offset returned is `0x00000ec2` a breakpoint in r2 can be set via:
113
+ # If the offset returned is `0x00000ec2`, a breakpoint for the target
114
+ # instruction can be set in r2 via:
114
115
  # ```
115
116
  # [0x00001050]> ood
116
- # INFO: hit breakpoint at: 0x55ee0a0e5139
117
117
  # [0x7f1a45bea360]> db main
118
118
  # [0x7f1a45bea360]> db (main)+0x00000ec2
119
119
  # [0x7f1a45bea360]> db
120
120
  # 0x558eebd75139 - 0x558eebd7513a 1 --x sw break enabled valid ...
121
121
  # 0x558eebd75ffb - 0x558eebd75ffc 1 --x sw break enabled valid ...
122
+ # [0x7f1a45bea360]> dc
123
+ # INFO: hit breakpoint at: 0x55ee0a0e5139
122
124
  # [0x55ee0a0e5139]> dc
123
- # [0x7feddfd2d360]> dc
124
- # INFO: hit breakpoint at: 0x558eebd75139
125
125
  # INFO: hit breakpoint at: 0x5558c3101ffb
126
126
  # [0x5558c3101ffb]> v
127
- # <step through via F7, F8, F9, etc. to get to desired breakpoint>
127
+ # <step through via F7, F8, F9, etc. to get to desired instruction>
128
128
  # ```
129
129
 
130
130
  def self.calc_addr_offset(opts = {})
@@ -245,31 +245,31 @@ module PWN
245
245
  # INFO: hit breakpoint at: 0x562e8547d139
246
246
  # [0x562e8547d139]> db
247
247
  # ```
248
- # 2. Populate start_addr w/ address (i.e. '0x562e8547d139') of a known function (e.g. main)
249
- # 3. Step down to the instruction you want to set a breakpoint. Record its address...
248
+ # 2. Populate start_addr w/ address (i.e. '0x562e8547d139') of a known function (i.e. main)
249
+ # 3. Step down to the instruction where you want to set a breakpoint. Record its address...
250
250
  # this is the target_addr.
251
251
  # ```
252
252
  # [0x562e8547d139]> v
253
- # <step through to target instruction via F7/F8>
253
+ # <step through to the target instruction via F7/F8>
254
254
  # ```
255
- # 4. Get the hex offset value by calling this method
255
+ # 4. Get the hex offset value by calling #{self}.calc_addr_offset method
256
256
  # 5. Future breakpoints can be calculated by adding the hex offset to the
257
257
  # updated start_addr (which changes every time the binary is executed).
258
- # If the offset returned is `0x00000ec2` a breakpoint in r2 can be set via:
258
+ # If the offset returned is `0x00000ec2`, a breakpoint for the target
259
+ # instruction can be set in r2 via:
259
260
  # ```
260
261
  # [0x00001050]> ood
261
- # INFO: hit breakpoint at: 0x55ee0a0e5139
262
262
  # [0x7f1a45bea360]> db main
263
263
  # [0x7f1a45bea360]> db (main)+0x00000ec2
264
264
  # [0x7f1a45bea360]> db
265
265
  # 0x558eebd75139 - 0x558eebd7513a 1 --x sw break enabled valid ...
266
266
  # 0x558eebd75ffb - 0x558eebd75ffc 1 --x sw break enabled valid ...
267
+ # [0x7f1a45bea360]> dc
268
+ # INFO: hit breakpoint at: 0x55ee0a0e5139
267
269
  # [0x55ee0a0e5139]> dc
268
- # [0x7feddfd2d360]> dc
269
- # INFO: hit breakpoint at: 0x558eebd75139
270
270
  # INFO: hit breakpoint at: 0x5558c3101ffb
271
271
  # [0x5558c3101ffb]> v
272
- # <step through via F7, F8, F9, etc. to get to desired breakpoint>
272
+ # <step through via F7, F8, F9, etc. to get to desired instruction>
273
273
  # ```
274
274
 
275
275
  #{self}.reverse_dump(
data/lib/pwn/version.rb CHANGED
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module PWN
4
- VERSION = '0.5.2'
4
+ VERSION = '0.5.3'
5
5
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: pwn
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.5.2
4
+ version: 0.5.3
5
5
  platform: ruby
6
6
  authors:
7
7
  - 0day Inc.
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-01-26 00:00:00.000000000 Z
11
+ date: 2024-01-28 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: activesupport