DISCLAIMER: I'm not responsible for anything stupid you do with this information. This is for educational purposes only!
Shellcode is exploit payload meant to produce a command shell for the attacker. The most common use is exploiting setuid programs to produce a root shell; however, in many cases any shell at all is further than one is meant to be allowed to go.
The standard shellcode is effectively the equivalent of:
hi, my honey. i'm really happy that my mailbox is full of those pretty hearts every day. so, i just thought i would return the favor, just in case you'd not yet realized just how i love you. you are just so very, very, very extraordinarily
WARNING: You can completely brick your shiny new BTC miner with this if you aren't careful. Standard disclaimers apply - I take no responsibility if you blow up your device.
I don't remember if we were promised root access to the Prospero's Android subsystem but I noticed some unnecessary and/or potentially dangerous system apps installed and I wanted them gone. This is how I eventually managed to hack root out. All files mentioned are available for download at the bottom of the page.
This Academic Free License (the "License") applies to any original work of authorship (the "Original Work") whose owner (the "Licensor") has placed the following licensing notice adjacent to the copyright notice for the Original Work:
Licensed under the Academic Free License version 3.0
1) Grant of Copyright License. Licensor grants You a worldwide, royalty-free, non-exclusive, sublicensable license, for the duration of the copyright, to do the following:
This section describes how to build a simple random event generator (REG) about the size of a bar of soap. It uses the RS232 serial port and streams random bits at 9600 baud. These are also commonly referred to random number generators or RNGs.
The "randomness" is generated by reverse biasing an NPN transistor and producing entropy from the amplified "ticks" produced. These ticks occur when electrons pass through the band gap and exit the base via quantum tunneling. As we currently understand quantum physics, this process is entirely random and cannot be externally influenced.
The analog portion of this circuit that actually generates the randomness came from Cryogenius. Gyro has a number of random number generator designs of his own there as well. Here's the recipe.
Move the power supply inside. This would allow tapping the transformer at multiple points to get different voltages for the logic and the debiased transistor.
Switch to a more powerful MCU that supports more sophisticated code. The RS-232 UART code really should be on a timer interrupt, a built-in pseudorandom number generator would be nice if it isn't too processor-intensive, etc.
Note: This doesn't work on newer versions of Wordpress if the user has properly enabled salted hashing. You can probably use the "forgot password" feature to get a working one, though, if you're willing to give it a legit email address.
Say you have access to Wordpress' database and want to gain control of the site itself. Creating a superuser account is simple if you can copy the password hash from another Wordpress site: