Yesterday was released a new OpenSSH bug (CVE-2016-0777) affecting versions between 5.4 to 7.1 in which the ssh_config option “UseRoaming yes” (allows for resuming SSH connections) could be exploited by tricking the SSH client to connect to a fake/compromised server allowing it to steal clients SSH keys.
After some hours I saw this tweet on my timeline:
The quickest method I know is using Python. You just need to define the shellcode as a variable and print it:
P.S.1: or if you are an ASM freak try rasm2 -d 6a0b58995266682d6389e7…
P.S.2: or even more https://dustri.org/b/how-to-radare2-a-fake-openssh-exploit.html