exploit the possibilities

Linux man /bin/cat Shellcode

Linux man /bin/cat Shellcode
Posted Sep 14, 2012
Authored by Dark-Puzzle

121 bytes small Linux/x86 man /bin/cat shellcode.

tags | x86, shellcode
systems | linux
MD5 | cda34ca20bc0e93c47a5030666c4410b

Linux man /bin/cat Shellcode

Change Mirror Download
/*
# 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
# 0 _ __ __ __ 1
# 1 /' \ __ /'__`\ /\ \__ /'__`\ 0
# 0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
# 1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
# 0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
# 1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
# 0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
# 1 \ \____/ >> Exploit database separated by exploit 0
# 0 \/___/ type (local, remote, DoS, etc.) 1
# 1 1
# 0 [x] Official Website: http://www.1337day.com 0
# 1 [x] Support E-mail : mr.inj3ct0r[at]gmail[dot]com 1
# 0 0
# 1 ========================================== 1
# 0 I'm Dark-Puzzle From Inj3ct0r TEAM 0
# 0 1
# 1 dark-puzzle[at]live[at]fr 0
# 0 ========================================== 1
# 1 White Hat 1
# 0 Independant Pentester 0
# 1 exploit coder/bug researcher 0
# 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-1
Shellcode By DarkPuzzle
Title : Linux/x86 Shellcode - "man /bin/cat" 121 bytes .
Author : Dark-Puzzle (Souhail Hammou)
Platform : Linux/x86
Gr33tz to : Inj3ct0rs Team - SecurityFocus - PacketstormSecurity - Exploit-db .
Usage ::Shellcode executes the command : man /bin/cat ( shows the user manual of /bin/cat)
to exit the manual press CTRL+C then write :wq
*/

char darkcode[] = "\xeb\x5a\x31\xc0\x31\xdb\x31\xd2\xb0\x04\xb3\x01\x59\xb2\x18\xcd\x80\xeb\x27\x5e\x31\xc0\x88\x46\x0c\x88\x46\x10\x89\x76\x11\x8d\x5e\x0d\x89\x5e\x15\x89\x46\x19\xb0\x0b\x89\xf3\x8d\x4e\x11\x8d\x56\x19\xcd\x80\xb0\x01\x31\xdb\xcd\x80\xe8\xd4\xff\xff\xff\x2f\x75\x73\x72\x2f\x62\x69\x6e\x2f\x6d\x61\x6e\x23\x63\x61\x74\x23\x41\x41\x41\x41\x42\x42\x42\x42\x43\x43\x43\x43\xe8\xa1\xff\xff\xff\x43\x6f\x64\x65\x64\x20\x42\x79\x20\x44\x61\x72\x6b\x2d\x50\x75\x7a\x7a\x6c\x65\x2f\x2a\x2a\x2f";
int main (int argc, char **argv)
{
int (*dark) ();
dark = (int (*) ()) darkcode;
(int) (*dark) ();

}
Login or Register to add favorites

File Archive:

October 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    16 Files
  • 2
    Oct 2nd
    1 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    24 Files
  • 5
    Oct 5th
    24 Files
  • 6
    Oct 6th
    11 Files
  • 7
    Oct 7th
    14 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    1 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    7 Files
  • 12
    Oct 12th
    15 Files
  • 13
    Oct 13th
    26 Files
  • 14
    Oct 14th
    10 Files
  • 15
    Oct 15th
    6 Files
  • 16
    Oct 16th
    2 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    14 Files
  • 19
    Oct 19th
    15 Files
  • 20
    Oct 20th
    20 Files
  • 21
    Oct 21st
    12 Files
  • 22
    Oct 22nd
    14 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close