pwn 0.5.2 → 0.5.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 2c00a83379a700092db7c7216a4512822ac070975c5af3311de7727c1348894e
4
- data.tar.gz: 298645aed83ccec72c6bf7d9ed3aa956a04a66277aaf964a380a313f5c815e8f
3
+ metadata.gz: 23bb25690e9f35296d04db4e6fbeaa297e15d86cad02b8329b740f00fa8e0032
4
+ data.tar.gz: df62daebc188a98c48fca439f86d58418a29fdc8bf0b7cd38fcf3debb858d82e
5
5
  SHA512:
6
- metadata.gz: 9836240965a052fa5d018b60af85dfd7484428f5c5d0e809fad9950d206b5ac2ee39552b624785e819c0d057e9563fd47beb0d18f87258226ba6d97275a3819b
7
- data.tar.gz: 971a59c78d6a25ab4b2406e416de1b90ee0e8cb9c91a0e098c0ae936336c06acc061868ff396a2e1328fba260a12a1693ae7c66251213e508cfdbb7fb12fe6c4
6
+ metadata.gz: d3f464f188dd4c0e04982b0e4d61f7b45e4afa4b028b01de37ca834fe53b49edaff0369a40d975c855c8432b09021e13d1200dbbbd30a039006b96542d534f26
7
+ data.tar.gz: 5984d6629d44b1c12cd09f5c811a9c238fb302b72b6b6964dc440f9ddf77accc2756ce746d7488b8fc1c7dce835bc18b432c9dba3e50300f1627236c12065628
data/README.md CHANGED
@@ -37,7 +37,7 @@ $ cd /opt/pwn
37
37
  $ ./install.sh
38
38
  $ ./install.sh ruby-gem
39
39
  $ pwn
40
- pwn[v0.5.2]:001 >>> PWN.help
40
+ pwn[v0.5.3]:001 >>> PWN.help
41
41
  ```
42
42
 
43
43
  [![Installing the pwn Security Automation Framework](https://raw.githubusercontent.com/0dayInc/pwn/master/documentation/pwn_install.png)](https://youtu.be/G7iLUY4FzsI)
@@ -52,7 +52,7 @@ $ rvm use ruby-3.3.0@pwn
52
52
  $ gem uninstall --all --executables pwn
53
53
  $ gem install --verbose pwn
54
54
  $ pwn
55
- pwn[v0.5.2]:001 >>> PWN.help
55
+ pwn[v0.5.3]:001 >>> PWN.help
56
56
  ```
57
57
 
58
58
  If you're using a multi-user install of RVM do:
@@ -62,7 +62,7 @@ $ rvm use ruby-3.3.0@pwn
62
62
  $ rvmsudo gem uninstall --all --executables pwn
63
63
  $ rvmsudo gem install --verbose pwn
64
64
  $ pwn
65
- pwn[v0.5.2]:001 >>> PWN.help
65
+ pwn[v0.5.3]:001 >>> PWN.help
66
66
  ```
67
67
 
68
68
  PWN periodically upgrades to the latest version of Ruby which is reflected in `/opt/pwn/.ruby-version`. The easiest way to upgrade to the latest version of Ruby from a previous PWN installation is to run the following script:
@@ -100,31 +100,31 @@ module PWN
100
100
  # INFO: hit breakpoint at: 0x562e8547d139
101
101
  # [0x562e8547d139]> db
102
102
  # ```
103
- # 2. Populate start_addr w/ address (i.e. '0x562e8547d139') of a known function (e.g. main)
104
- # 3. Step down to the instruction you want to set a breakpoint. Record its address...
103
+ # 2. Populate start_addr w/ address (i.e. '0x562e8547d139') of a known function (i.e. main)
104
+ # 3. Step down to the instruction where you want to set a breakpoint. Record its address...
105
105
  # this is the target_addr.
106
106
  # ```
107
107
  # [0x562e8547d139]> v
108
- # <step through to target instruction via F7/F8>
108
+ # <step through to the target instruction via F7/F8>
109
109
  # ```
110
- # 4. Get the hex offset value by calling this method
110
+ # 4. Get the hex offset value by calling PWN::Plugins::XXD.calc_addr_offset method
111
111
  # 5. Future breakpoints can be calculated by adding the hex offset to the
112
112
  # updated start_addr (which changes every time the binary is executed).
113
- # If the offset returned is `0x00000ec2` a breakpoint in r2 can be set via:
113
+ # If the offset returned is `0x00000ec2`, a breakpoint for the target
114
+ # instruction can be set in r2 via:
114
115
  # ```
115
116
  # [0x00001050]> ood
116
- # INFO: hit breakpoint at: 0x55ee0a0e5139
117
117
  # [0x7f1a45bea360]> db main
118
118
  # [0x7f1a45bea360]> db (main)+0x00000ec2
119
119
  # [0x7f1a45bea360]> db
120
120
  # 0x558eebd75139 - 0x558eebd7513a 1 --x sw break enabled valid ...
121
121
  # 0x558eebd75ffb - 0x558eebd75ffc 1 --x sw break enabled valid ...
122
+ # [0x7f1a45bea360]> dc
123
+ # INFO: hit breakpoint at: 0x55ee0a0e5139
122
124
  # [0x55ee0a0e5139]> dc
123
- # [0x7feddfd2d360]> dc
124
- # INFO: hit breakpoint at: 0x558eebd75139
125
125
  # INFO: hit breakpoint at: 0x5558c3101ffb
126
126
  # [0x5558c3101ffb]> v
127
- # <step through via F7, F8, F9, etc. to get to desired breakpoint>
127
+ # <step through via F7, F8, F9, etc. to get to desired instruction>
128
128
  # ```
129
129
 
130
130
  def self.calc_addr_offset(opts = {})
@@ -245,31 +245,31 @@ module PWN
245
245
  # INFO: hit breakpoint at: 0x562e8547d139
246
246
  # [0x562e8547d139]> db
247
247
  # ```
248
- # 2. Populate start_addr w/ address (i.e. '0x562e8547d139') of a known function (e.g. main)
249
- # 3. Step down to the instruction you want to set a breakpoint. Record its address...
248
+ # 2. Populate start_addr w/ address (i.e. '0x562e8547d139') of a known function (i.e. main)
249
+ # 3. Step down to the instruction where you want to set a breakpoint. Record its address...
250
250
  # this is the target_addr.
251
251
  # ```
252
252
  # [0x562e8547d139]> v
253
- # <step through to target instruction via F7/F8>
253
+ # <step through to the target instruction via F7/F8>
254
254
  # ```
255
- # 4. Get the hex offset value by calling this method
255
+ # 4. Get the hex offset value by calling #{self}.calc_addr_offset method
256
256
  # 5. Future breakpoints can be calculated by adding the hex offset to the
257
257
  # updated start_addr (which changes every time the binary is executed).
258
- # If the offset returned is `0x00000ec2` a breakpoint in r2 can be set via:
258
+ # If the offset returned is `0x00000ec2`, a breakpoint for the target
259
+ # instruction can be set in r2 via:
259
260
  # ```
260
261
  # [0x00001050]> ood
261
- # INFO: hit breakpoint at: 0x55ee0a0e5139
262
262
  # [0x7f1a45bea360]> db main
263
263
  # [0x7f1a45bea360]> db (main)+0x00000ec2
264
264
  # [0x7f1a45bea360]> db
265
265
  # 0x558eebd75139 - 0x558eebd7513a 1 --x sw break enabled valid ...
266
266
  # 0x558eebd75ffb - 0x558eebd75ffc 1 --x sw break enabled valid ...
267
+ # [0x7f1a45bea360]> dc
268
+ # INFO: hit breakpoint at: 0x55ee0a0e5139
267
269
  # [0x55ee0a0e5139]> dc
268
- # [0x7feddfd2d360]> dc
269
- # INFO: hit breakpoint at: 0x558eebd75139
270
270
  # INFO: hit breakpoint at: 0x5558c3101ffb
271
271
  # [0x5558c3101ffb]> v
272
- # <step through via F7, F8, F9, etc. to get to desired breakpoint>
272
+ # <step through via F7, F8, F9, etc. to get to desired instruction>
273
273
  # ```
274
274
 
275
275
  #{self}.reverse_dump(
data/lib/pwn/version.rb CHANGED
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module PWN
4
- VERSION = '0.5.2'
4
+ VERSION = '0.5.3'
5
5
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: pwn
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.5.2
4
+ version: 0.5.3
5
5
  platform: ruby
6
6
  authors:
7
7
  - 0day Inc.
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-01-26 00:00:00.000000000 Z
11
+ date: 2024-01-28 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: activesupport