Vulnerability Development mailing list archives

Re: remote exploit


From: core.lists.exploit-dev () CORE-SDI COM (Gerardo Richarte)
Date: Mon, 10 Jul 2000 15:41:08 -0300


Jim Stickley wrote:

Hello,

I can't send it a null so sending \x00\x11\x11\x11 will not work.

If after buffer overflowing you have a register pointing to your code (let's
say EBX) find a JMP EBX in memory in an address that is accesible for you, and
jump there, the JMP EBX will do the rest for you.

        richie


--
A390 1BBA 2C58 D679 5A71 - 86F9 404F 4B53 3944 C2D0
Investigacion y Desarrollo - CoreLabs - Core SDI
http://www.core-sdi.com

--- For a personal reply use gera () core-sdi com



Current thread: