In loops where a break can stop the loop at once, there is a statement called
continue that can help to switch the available loops. Suppose if there are
five loop statements in the shellcode by using
continue the loops can be
interchanged. This will help to create a detailed
exploiting code that can
compromise systems and do multiple cross re-checks.
Below is an example of the continue statement:
example@ linuxwar : beep.sh
for(i=0)
x>1
y>2
if(b>2)
continue:
8) Eval
Linux and shellcode usually consist of a lot
of arguments that need to be
processed. There will be a lot of problems if strings
and variables are parsed
in the same way. For this reason, a command called eval is introduced in the
bash shell.
eval command replaces the arguments that are
present with the variables
that are pointed out. You can even use eval command to parse strings into
commands for execution as shown below.
example@ linuxwar : eval beep.s h
9) Exec
Execution is a process that is said to start the task. Every installation file is
an execution format because it starts a new system shell in the background.
Hackers should be aware of execution shells because they perform a lot of
initiation and analysis tasks.
When the exec command is entered in the Linux command shell the screen
or the interface that we are working on refreshes out. Exec can also be used
in script files to start dependency installations as we used in the first chapter
to install kali Linux.
This is the command that explains exec command in detail:
example@ linuxwar : exec beep.sh