Penetration Testing mailing list archives
Re: Penetration of HP/UX
From: Paul Melson <pmelson () gmail com>
Date: Tue, 14 Jun 2011 20:54:22 -0400
On Jun 14, 2011, at 3:26 PM, Philipp Lachberger <ph_lachi () yahoo de> wrote:
To all who found my deadly mistake of saying SPARC architecture instead of PA-RISC - Thank you very much (at least I got the Endianess right ;-) )
You didn't really. Both PA-RISC and IA64 have switchable endianness. As I said in my initial response, the issue with writing shellcode for PA-RISC is that the registers and some of the instruction set are completely different from x86. Forget byte order, you have to learn a different version of assembly. Read the Phrack article Marco provided a link for. ------------------------------------------------------------------------ This list is sponsored by: Information Assurance Certification Review Board Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT and CEPT certs require a full practical examination in order to become certified. http://www.iacertification.org ------------------------------------------------------------------------
Current thread:
- Re: Penetration of HP/UX, (continued)
- Re: Penetration of HP/UX michael getachew (Jun 19)
- Re: Penetration of HP/UX Roland Kessler (Jun 19)
- Re: Penetration of HP/UX michael getachew (Jun 19)
- Re: Penetration of HP/UX Paul Melson (Jun 19)
- Re: Penetration of HP/UX AK (Jun 19)
- Re: Penetration of HP/UX Paul Melson (Jun 19)
- Re: Penetration of HP/UX Jan Muenther (Jun 23)
- Re: Penetration of HP/UX Philipp Lachberger (Jun 18)
- Re: Penetration of HP/UX Paul Melson (Jun 18)