Bugtraq mailing list archives
Re: WebDAV exploit: using wide character decoder scheme
From: Dave Aitel <dave () immunitysec com>
Date: Wed, 26 Mar 2003 11:14:43 -0500
Unfortunately, on my US Windows 2K SP3 build (and I assume all others), those %u directives get translated into question marks. (0x003F in hex) :< This exploit must be much easier to get reliable on other language versions. A shame, really. Did you use my encoder or did you write your shellcode manually, just out of curiosity? Dave Aitel Advanced Engineering Directorate Immunity, Inc. http://www.immunitysec.com/CANVAS/ "Hacking like it's done in the movies." On Wed, 26 Mar 2003 22:55:12 +0900 ¿ÀÁ¤¿í <mat () panicsecurity org> wrote:
my @return_addresses=( "%u32ac%u77e2", "%uc1b5%u76ae", "%u005d%u77a5",
Current thread:
- WebDAV exploit: using wide character decoder scheme 오정욱 (Mar 26)
- Re: WebDAV exploit: using wide character decoder scheme Dave Aitel (Mar 26)
- Re: WebDAV exploit: using wide character decoder scheme Roman Medina (Mar 27)
- <Possible follow-ups>
- Re: WebDAV exploit: using wide character decoder scheme JW Oh (Mar 27)
- Re: WebDAV exploit: using wide character decoder scheme Dave Aitel (Mar 26)