Quantcast
Channel: windows – Security Sift
Viewing all articles
Browse latest Browse all 8

Windows Exploit Development – Part 3: Changing Offsets and Rebased Modules

$
0
0

Overview In Part 2 we constructed a basic stack based overflow exploit for ASX To MP3 Converter. As I indicated in that post, the exploit itself is far from perfect. Successful EIP overwrite is influenced by the file path of the m3u file. In addition, although application modules are preferred when selecting jump/call addresses, the application DLL we used was rebased, meaning the address to our CALL EBX instruction is...

The post Windows Exploit Development – Part 3: Changing Offsets and Rebased Modules appeared first on Security Sift.


Viewing all articles
Browse latest Browse all 8

Trending Articles