December 2017
Intermediate to advanced
860 pages
16h 1m
English
In order to exploit the application and gain access to the target system, we need to know about the things listed in the following table:
| Component | Use |
| Offset | We crashed the application in the previous section. However, in order to exploit the application, we will need the exact size of the input that is good enough to fill the space + EBP register, so that whatever we provide after our input goes directly into the EIP register. We refer to the amount of input that is good enough to land us right before the EIP register as the offset. |
| Jump address/Ret | This is the actual address to overwrite in the EIP register. This is generally the address of a JMP ESP instruction from a DLL file that helps jumping to the ... |
Read now
Unlock full access