EXECUTION

RUNNING RAW MACHINE CODE/SHELLCODE

root@sre:~$ python3
 >>> from pwn import *
 >>> context(os="linux", arch="amd64", log_level="error")
 >>> run_shellcode(unhex('4831db66bb79215348bb422041636164656d5348bb48656c6c6f204854534889e64831c0b0014831ff40b7014831d2b2120f054831c0043c4030ff0f05')).interactive()

 OUTPUT:
  Hello HTB Academy!
 
 * unhex() converts the raw machine code back to binary

PYTHON SCRIPT:

root@sre:~$ nano payloadLoader.py
 #!/usr/bin/python3

 import sys
 from pwn import *

 context(os="linux", arch="amd64", log_level="error")

 run_shellcode(unhex(sys.argv[1])).interactive()
 
root@sre:~$ python3 payloadLoader.py '4831db66bb79215348bb422041636164656d5348bb48656c6c6f204854534889e64831c0b0014831ff40b7014831d2b2120f054831c0043c4030ff0f05'
 Hello HTB Academy!

Last updated