Vulnerability Development mailing list archives

win32 stack bof & shellcode size


From: ". npguy" <npguy () linuxmail org>
Date: Thu, 30 Oct 2003 10:39:29 +0800

Hi,

are there any techniques to execute the shellcode if the necessary
opcodes cannot fit after the return address!
the return address is overwritten with an address of "jmp esp"!

some says its not possible, is it?

TIA

-- 
______________________________________________
Check out the latest SMS services @ http://www.linuxmail.org 
This allows you to send and receive SMS through your mailbox.


Powered by Outblaze


Current thread: