Vulnerability Development mailing list archives
win32 stack bof & shellcode size
From: ". npguy" <npguy () linuxmail org>
Date: Thu, 30 Oct 2003 10:39:29 +0800
Hi, are there any techniques to execute the shellcode if the necessary opcodes cannot fit after the return address! the return address is overwritten with an address of "jmp esp"! some says its not possible, is it? TIA -- ______________________________________________ Check out the latest SMS services @ http://www.linuxmail.org This allows you to send and receive SMS through your mailbox. Powered by Outblaze
Current thread:
- win32 stack bof & shellcode size . npguy (Oct 30)
- RE: win32 stack bof & shellcode size Brett Moore (Oct 31)