Skip to content

InlineEgg Shellcode

Last updated on 2007-04-12

Made a nice shellcode using the python [inlineEgg](http://community.corest.com/~gera/ProgrammingPearls/InlineEgg.html) library. The shellcode is designed to smash the stack of a programm which is listen on a socket. The read buffer gets overflowed by the shellcode.
The code was tested an on older SUSE9.0, because current disto use [pie](http://www.gentoo.org/proj/en/hardened/pie-ssp.xml?style=printable=) and
[ssp](http://www.research.ibm.com/trl/projects/security/ssp/)

Features:

* Python script that generates the shellcode
* Re-uses the listen socket of the victim and connects it to new shell
* Scans for correct fd and peername
* Embedded Telnet client which connects to created remote shell
* Encoder to generate polymorph shellcode

[Download](http://optixx.org/download/inlineegg_reuse_socket.tar.gz)

Be First to Comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.