Tag: shellcode

Stack Adjustment by hand

When you are developing an exploit and you have very limited space for your payload you might need to adjust the stack to be able to use staged exploits. The problem, in case of a multi-stage payload, is that when the first stage that you send in your exploit payload starts to download the second stage, the stack pointer (ESP) might point to a place which is not far enough from the first stage in the memory; hence, the second stage might corrupt the code that you are executing. Stack adjustment is a technique that tries to solve this problem by setting the ESP to create more space for the second stage.
Continue reading

Shellcode wrapper for Linux

This post is about how to create Linux binary executable shellcodes using msfpayload.

Continue reading

© 2017 Æther Security Lab

Theme by Anders NorenUp ↑