December 2017
Intermediate to advanced
860 pages
16h 1m
English
Let us look at the following table that highlights all the necessary values and their usage:
| Serial Number | Variable | Value |
| 1 | Offset value |
2048 |
| 2 | Known location in memory containing POP-POP-RETN series of instructions/P-P-R Address |
0x0000583b |
| 3 | Backward jump/long jump to find the ShellCode |
\xe9\x85\xe9\xff\xff |
| 4 | Short jump/pointer to the next SEH frame |
\xeb\xf9\x90\x90 |
We now have all the essentials to build the Metasploit module for the BSplayer 2.68 application. We can see that the author has placed the ShellCode exactly after 2048 NOPs. However, this does not mean that the actual offset value is 2048. The author of the exploit has placed it before the SEH overwrite because there might be no ...
Read now
Unlock full access