diff --git a/Lab02/documentation/images/shell/01-test.png b/Lab02/documentation/images/shell/01-test.png new file mode 100755 index 0000000..4064181 Binary files /dev/null and b/Lab02/documentation/images/shell/01-test.png differ diff --git a/Lab02/documentation/main.tex b/Lab02/documentation/main.tex index 9fbdc14..99fe5c7 100644 --- a/Lab02/documentation/main.tex +++ b/Lab02/documentation/main.tex @@ -102,6 +102,7 @@ \newpage \listoffigures \include{bufferOverflow/bufferOverflow} + \include{shell/shell} \printbibliography[title=Literaturverzeichnis] diff --git a/Lab02/documentation/shell/shell.tex b/Lab02/documentation/shell/shell.tex new file mode 100644 index 0000000..ae0920b --- /dev/null +++ b/Lab02/documentation/shell/shell.tex @@ -0,0 +1,20 @@ +\section{Reverse Shell Exploitation With Netcat} + +\subsection{Erster Test} + +Zum testen wird das c Programm\footnote{\href{https://www.exploit-db.com/shellcodes/47396}{https://www.exploit-db.com/shellcodes/47396}} kompiliert und ausgeführt. + +\begin{lstlisting}[breaklines] +gcc --no-pie -z execstack -fno-stack-protector -D_FORTIFY_SOURCE=0 test-shellcode.c -o shell +./shell +\end{lstlisting} + +Nun kann man auf dem Port 43690 eine Verbindung aufbauen. + +\begin{figure}[H] + \begin{center} + \includegraphics[width=0.9\textwidth]{shell/01-test} + \caption{Erster Test} + \label{fig:Erster Test} + \end{center} +\end{figure}