Security Basics mailing list archives
Re: Finding Bad Characters in Exploit Research?
From: John Nash <rootsecurityfreak () gmail com>
Date: Sat, 19 Feb 2011 08:10:33 +0530
Interesting. The only issue is that Olly/Immunity does not allow copying of the just the hex bytes of the memory dump ..there are other things which also get copied.... so need to run a "pre-processor" to comparememory. JN On Fri, Feb 18, 2011 at 10:42 PM, Brandon Nistor <brandon.nistor () gmail com> wrote:
Take a look at this: http://exploit.co.il/hacking/exploit-dev-tools-finding-bad-characters/ On Feb 18, 2011 11:05 AM, "John Nash" <rootsecurityfreak () gmail com> wrote: Hello All, Just dived into exploit research and finding bad characters is killing me! Can someone point me to a good document / methodology / automated way to find bad characters? Any help will be greatly appreciated! Rgds, JN ------------------------------------------------------------------------ Securing Apache Web Server with thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates. http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1 ------------------------------------------------------------------------
------------------------------------------------------------------------ Securing Apache Web Server with thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates. http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1 ------------------------------------------------------------------------
Current thread:
- Finding Bad Characters in Exploit Research? John Nash (Feb 18)
- Message not available
- Re: Finding Bad Characters in Exploit Research? John Nash (Feb 22)
- Message not available
- Message not available
- Re: Finding Bad Characters in Exploit Research? John Nash (Feb 22)