![]() The process memory has 3 componentsĬode segment – Which has the application code and is read onlyĭata segment – which holds the global variables and data defined by the application I will point out about this notation when it encounters.Įvery application is allocated a chunk of memory by kernel. As far as this tutorial is concerned, keep in mind that Intel x86 has the 32 bits registers and the virtual memory address are stored in little endian notation. Well this itself is a very vast topic, so just google it and brush up your knowledge regarding memory management. The general purpose registers for Intel x86 areĮAX – Accumulator – It is used for I/O port access, arithmetic, interrupt callsĮBX – Base – It is used as a base pointer for memory accessĮCX – Counter – It is used as a loop counter and for shiftsĮDX – Data – It is used for I/O port access, arithmetic, some interruptĮSP – Stack pointer – Holds the top address of the stackĮBP – Base Pointer – Holds the base address of the stackĮSI – Source Index – Used for string and memory array copyingĮDI – Destination Index – Used for string, memory array copying and setting and for far pointer addressing with ESIĮIP – Instruction Pointer – Holds the offset of the next instruction ![]() In this article i will demonstrate how to exploit an application and get the command prompt of the victim in general, you can do more malicious stuff.Ī hacker by the handle Gold_M has notified a buffer overflow bug in CoolPlayer Portable 2.19.1, though he didn’t publish the complete exploit including shellcode. Before I start with this tutorial, i would like to say a BIG thank to Peter Van Eeckhoutte without whom i would have never learned more than exploiting dummy C application ( kinda strcpy() ).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |