0% found this document useful (0 votes)
237 views

012 Exploiting Echo Server v3 Part 2

http://s71.nitroflare.com/d/1e45dd493c0e434a2dfbad67f3be7231/macOS_Server_5.6.1_MAS_[TNT].dmg

Uploaded by

marlon_tayag
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
237 views

012 Exploiting Echo Server v3 Part 2

http://s71.nitroflare.com/d/1e45dd493c0e434a2dfbad67f3be7231/macOS_Server_5.6.1_MAS_[TNT].dmg

Uploaded by

marlon_tayag
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Exploi'ng

 Simple  Buffer  Overflows  on  


Win32  

Vivek  Ramachandran  
SWSE,  SMFE,  SPSE,  SISE,  SLAE,  SGDE  Course  Instructor  

Cer'fica'ons:                          hNp://www.securitytube-­‐training.com    
 
Pentester  Academy:    hNp://www.PentesterAcademy.com    

©SecurityTube.net  
Exploi'ng  Echo  Server  v3  Part  2  

©SecurityTube.net  
TCP  Echo  Server  v3  

©SecurityTube.net  
Exploita'on  

Low  Memory   Low  Memory  

NOP  SLED  
Local  
Variables  +  
Others  
Shellcode  

EBP  
(Frame   NOP  SLED  
Pointer)  

RETURN   Our  Code  


Address   Address  

0x11111111   -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐  

-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐   High  Memory   -­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐-­‐   High  Memory  

©SecurityTube.net  
Pentester  Academy  

©SecurityTube.net  

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy