[Full-Disclosure] HOON & shellcode again!

From: ned (ndat_private)
Date: Fri Aug 15 2003 - 00:58:53 PDT

  • Next message: Halvar Flake: "Re: Rolf Rolles analysis"

    Hey,
    second installament of HOON, with calls and jmps pretty much fully 
    working. anyway, there is going to be alot of sub-methods goin into HOON 
    in the next few releases as it shifts to accomodate people trying to 
    exploit stuff. some possibilities are unicode shellcode creation (although 
    the rest of the artcles sucked - PHraCk that is...). anyway, here's a 
    little demo to suck you in.
    
    C:\HOON> python hoon.py
    <-- TOKENS -->
    [INSTRUCTION] [REGISTER] [REGISTER] : xorl %eax,%eax
    [INSTRUCTION] [REGISTER] [REGISTER] : xorl %esp,%esp
    [INSTRUCTION] [REGISTER] [REGISTER] : xorl %ebx,%ebx
    <-- ENDTOKEN -->
    
    <-- SHELLCODE -->
    char sc[]="\x33\xc0\x33\xc0\x33\xc0";
    <-- ENDSHELLCODE -->
    \x33\xc0\x33\xc0\x33\xc0
    
    mmmkay was the only thing on my prompt!
    
    get it from:
    
    http://felinemenace.org/HOON.zip
    http://felinemenace.org/HOON.tar
    
    FIX IT PLEASE!
    - nd
    -- 
    http://felinemenace.org/~nd
    
    _______________________________________________
    Full-Disclosure - We believe in it.
    Charter: http://lists.netsys.com/full-disclosure-charter.html
    



    This archive was generated by hypermail 2b30 : Fri Aug 15 2003 - 05:14:22 PDT