Vulnerability Development mailing list archives

remote exploit


From: jim () GARRISON COM (Jim Stickley)
Date: Fri, 7 Jul 2000 16:53:45 -0700


Hello,

I am working on an exploit right now and have run into a small problem.  The
exploit is a remote buffer overflow and I am able to push my source on the
stack without any trouble.  My code ends up in a segment something like
0x111111.  Now, here is the hard part.  When I go to set the execution to
point to my code, it will not accept 0x111111 instead it insists its larger
0x11111111.  I can't send it a null so sending \x00\x11\x11\x11 will not
work.    Does anyone know of a way around this?

Thanx

        -Jim


Current thread: