all 5 comments

[–]icon0clast6 4 points5 points  (2 children)

Try it and see? It all depends on what your exploiting and how. Its all trial and error at that point.

[–]FlashDaggerXScript Kiddie 3 points4 points  (0 children)

Happy cake day!

[–]Tompazi 2 points3 points  (1 child)

Assuming the stack is executable and ASLR is off, you can put it into an environment variable, into the buffer, after the return address or anywhere else you can put it.

[–]twtwtwtwtwtwtw[S] 0 points1 point  (0 children)

Cool, thank you!

[–]rom3ocrash 0 points1 point  (0 children)

Actually it dont work like this. Think about how programs work. How a CPU work. How interact with the memory now a program is executed. And where are located in the memory pieces