#include <sys/mman.h>
#include <string.h>
#include <stdio.h>
char sc[]= "your shellcode here";
int main(){
void * a = mmap(0, 4096, PROT_EXEC |PROT_READ | PROT_WRITE, MAP_ANONYMOUS | MAP_SHARED, -1, 0);
printf("allocated executable memory at: %p\n", a);
((void (*)(void)) memcpy(a, sc, sizeof(sc)))();
}
'Programming' 카테고리의 다른 글
checksec.sh (0) | 2013.03.19 |
---|---|
argv_input_test.c (0) | 2013.03.19 |
Windows7 SSDT Hooking (6) | 2013.03.06 |
x86 privilege level (0) | 2013.02.21 |
OpenSSL Server Example (0) | 2013.02.05 |