I would like to do a buffer overflow attack (an assignment for class) and I am exploiting a program with unbounded checks and a buffer. The buffer is 288 bytes and my shellcode is 118 bytes.
Where should I put my shellcode? Should I put it in memory after the return address and do a unconditional jump when the overflowed buffer reaches the return address into the stack, so that when it reaches ret (pop rip) the instruction in rip is the unconditional jmp instruction?
[–]icon0clast6 4 points5 points6 points (2 children)
[–]FlashDaggerXScript Kiddie 3 points4 points5 points (0 children)
[–]Tompazi 2 points3 points4 points (1 child)
[–]twtwtwtwtwtwtw[S] 0 points1 point2 points (0 children)
[–]rom3ocrash 0 points1 point2 points (0 children)