buf="\x6a\x0a\x5e\x31\xdb Cyber Security Rants, w00t!"
Saturday, March 10, 2018
Cloudme Sync 1.9.2 Remote Buffer Overflow Demo
The last exploit I wrote used plain vanilla EIP overwrite. This time, I used a slightly different technique called SEH. The advantage over EIP is that SEH provides more buffer space for the shellcode. I thought it would be good to understand the difference between EIP and SEH based buffer overflow exploitation techniques. You can find my code on github, here. Here is a short video of my exploit in action.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment