Skip to Main Content
Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
book

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

by James C Foster
April 2005
Intermediate to advanced content levelIntermediate to advanced
700 pages
20h 39m
English
Syngress
Content preview from Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
acter. Line 3 overwrites the saved return address with the address of our CALL EAX
instruction. Line 4 appends 1000 bytes of the 0xCC character to the end of the attack
string. When the processor hits the 0xCC opcode directly following the return address, the
process should halt, and we can calculate the amount of space available for the payload.
When appending large buffers to the attack string, it is possible to send too much
data. When too much data is sent, it will trigger an exception, which gets handled by
exception handlers. An exception handler will redirect control of the process away from
our return address, and make it more difficult to deter ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

32/64-Bit 80x86 Assembly Language Architecture

32/64-Bit 80x86 Assembly Language Architecture

James Leiterman

Publisher Resources

ISBN: 9781597490054