|
Тема |
Re: Cracking Code Injection [re: Cl] |
|
Автор |
Jc{P}nX (╦╩&) |
|
Публикувано | 08.12.01 16:17 |
|
|
Хей мен!
Какво точно ти трябва - buffer overrun paylodz or smth. like "C+|+ Virtual Destructor finder"(thoze r not any of trademarx!)?
Не че съм опитен просто, ако мога с нещо да те упътя - дори нек'во video ot -> where X z variable:value:(int<10).
C'ya c'ya!!!
Advanced Buffer Overflow Techniques.
This is a technical talk aimed at people who have already been exposed to buffer overflows and want to learn more. The talk assumes the audience has at least some knowledge of CPU's and Processes. For those of you who already understand buffer overflows, this talk will be a refreshing discourse on technique. We will show how the injection method can be decoupled from the payload. We then explore the details and challenges of injecting code into a remote process. We will also explore the payload, the encoding methods, and how to dynamically load new functions. Lastly, we discuss the possible effects of a payload, including network worms, virus, and rootkits.
See It! Real Media (surestream video file) Hear it! Real Audio (28k-isdn surestream)
...:>>>
Tuk e videoto za koeto snan duma.Редактирано от Jc{P}nX на 08.12.01 16:27.
|
| |
|
|
|