Sishell provides a reverse shellcode kit for x86 Linux, FreeBSD, NetBSD, and OpenBSD.
sishell is a reverse (connecting) shellcode kit for x86 Linux, FreeBSD, NetBSD, and OpenBSD. You may generate both regular shellcode (no NULLs) and stand-alone ELF executables (e.g. for injection into Web script vulnerabilities).
It is distributed with a Makefile system, a custom ELF brander (brandelf), and a C example code generator.
Shellcode is a piece of machine-readable code, or script code that has just one mission; to open up a command interpreter (shell) on the target system so that an "attacker" can type in commands in the same fashion as a regular authorized user, or system administrator of that system can (with a few
not-so-important exceptions though). However, in order to get remote access to the shell, you're going to need some kind of networking support in your
If the shellcode is to be used to exploit buffer overflows (e.g.) in binary, machine-readable software, the shellcode is going to have to be machine-readable (binary) and, to make things more complicated, it can't contain any null bytes (0x00). Null (0) is a string delimiter that tells all C string functions (and other implementations) that once found the function should stop processing the string (thus, a null-terminated string). We don't want an input function to stop processing our shellcode, since we want to upload the entire shellcode into the vulnerable program and tell it to execute it.