start part 2
This commit is contained in:
parent
b4f04e91be
commit
bf3c4b21ad
3 changed files with 21 additions and 0 deletions
BIN
Lab02/documentation/images/shell/01-test.png
Executable file
BIN
Lab02/documentation/images/shell/01-test.png
Executable file
Binary file not shown.
After Width: | Height: | Size: 60 KiB |
|
@ -102,6 +102,7 @@
|
|||
\newpage
|
||||
\listoffigures
|
||||
\include{bufferOverflow/bufferOverflow}
|
||||
\include{shell/shell}
|
||||
|
||||
\printbibliography[title=Literaturverzeichnis]
|
||||
|
||||
|
|
20
Lab02/documentation/shell/shell.tex
Normal file
20
Lab02/documentation/shell/shell.tex
Normal file
|
@ -0,0 +1,20 @@
|
|||
\section{Reverse Shell Exploitation With Netcat}
|
||||
|
||||
\subsection{Erster Test}
|
||||
|
||||
Zum testen wird das c Programm\footnote{\href{https://www.exploit-db.com/shellcodes/47396}{https://www.exploit-db.com/shellcodes/47396}} kompiliert und ausgeführt.
|
||||
|
||||
\begin{lstlisting}[breaklines]
|
||||
gcc --no-pie -z execstack -fno-stack-protector -D_FORTIFY_SOURCE=0 test-shellcode.c -o shell
|
||||
./shell
|
||||
\end{lstlisting}
|
||||
|
||||
Nun kann man auf dem Port 43690 eine Verbindung aufbauen.
|
||||
|
||||
\begin{figure}[H]
|
||||
\begin{center}
|
||||
\includegraphics[width=0.9\textwidth]{shell/01-test}
|
||||
\caption{Erster Test}
|
||||
\label{fig:Erster Test}
|
||||
\end{center}
|
||||
\end{figure}
|
Reference in a new issue