Home page logo
/

pen-test logo Penetration Testing mailing list archives

Re: How to make buffer overflow exploits more reliable
From: "skillTube.com" <lists73 () skilltube com>
Date: Tue, 5 Jun 2007 23:28:22 +0200

Are you trying to exploit one specific vulnerability or are you playing around with different bugs?

Making exploits on Windows more reliable starts by choosing the right return address (e.g. Jmp esp/call esp), preferable one that can be found inside the vulnerable application or inside one of its own Dll'S. You should also check if your shellcode is not altered by the application. Try to identify which characters are changed or rejected.

regards
skillTube Team


------------------------------------------------------------------------
This List Sponsored by: Cenzic

Are you using SPI, Watchfire or WhiteHat?
Consider getting clear vision with Cenzic
See HOW Now with our 20/20 program!

http://www.cenzic.com/c/2020
------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
  • Re: How to make buffer overflow exploits more reliable skillTube.com (Jun 05)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault