Shellcode

Results: 175



#Item
121Buffer overflow / Stack / Shellcode / Software engineering / Software quality / Assembly languages / Software bugs / Computing / X86

A stack model for symbolic buffer overflow exploitability analysis Extended Abstract Gustavo Grieco University of Grenoble VERIMAG

Add to Reading List

Source URL: dcc.fceia.unr.edu.ar

Language: English - Date: 2013-03-12 10:48:31
122Computer architecture / MOV / Hooking / Pointer / Native API / Ntoskrnl.exe / High Level Assembly / Computing / Software engineering / Shellcode

MS11[removed]Dissecting a 0 day By Ronnie Johndas 1

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2012-04-06 09:43:43
123Software bugs / Data types / Primitive types / Computer errors / Assembly languages / Buffer overflow / Shellcode / Pointer / Subroutine / Computing / Software engineering / Computer programming

INDEX Symbols & Numbers & (ampersand) for address-of operator, 45 for background process, 347

Add to Reading List

Source URL: www.tinker.tv

Language: English - Date: 2012-02-08 15:24:21
124Software bugs / Shellcode / Buffer overflow / Address space layout randomization / Unistd.h / Transmission Control Protocol / GNU Debugger / Filesystem Hierarchy Standard / Stack / Computing / Software / Computer programming

CONTENTS IN DETAIL 0x100 INTRODUCTION 1

Add to Reading List

Source URL: www.tinker.tv

Language: English - Date: 2012-02-08 15:24:21
125Software quality / Stack buffer overflow / Address space layout randomization / Buffer overflow protection / Return-to-libc attack / Buffer overflow / Stack / Shellcode / FALSE / Computing / Software bugs / Software engineering

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2014-05-19 16:48:47
126

Travis Goodspeed Nifty Tricks and Sage Advice for Shellcode on Embedded Systems

Add to Reading List

Source URL: conference.hitb.org

- Date: 2014-10-26 13:04:35
    127Computer architecture / X86 architecture / Assembly languages / X86 instructions / ActionScript / Low-level programming language / MOV / SWF / Shellcode / Computing / Adobe Flash / Software

    IBM Global Technology Services April 2008 Application-Specific Attacks: Leveraging the ActionScript Virtual Machine

    Add to Reading List

    Source URL: www.inf.fu-berlin.de

    Language: English - Date: 2011-07-12 13:16:20
    128Shellcode / Polymorphic code / Self-modifying code / MOV / Metasploit Project / Buffer overflow / Hacking: The Art of Exploitation Second Edition / Cyberwarfare / Computer security / Software

    PDF Document

    Add to Reading List

    Source URL: cs.unc.edu

    Language: English - Date: 2009-10-28 10:35:48
    129Shellcode / Malware / Software bugs / Hooking / Polymorphic code / Windows API / Code injection / Exploit / Application programming interface / Cyberwarfare / Computer security / Computing

    Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow Fabian Monrose

    Add to Reading List

    Source URL: cs.unc.edu

    Language: English - Date: 2012-08-20 18:04:07
    130Shellcode / Software bugs / Buffer overflow / Polymorphic code / Arbitrary code execution / Self-modifying code / Computer virus / Address space layout randomization / Metasploit Project / Computing / Computer security / Cyberwarfare

    J Comput Virol[removed]:257–274 DOI[removed]s11416[removed]z O R I G I NA L PA P E R Network-level polymorphic shellcode detection using emulation

    Add to Reading List

    Source URL: cs.unc.edu

    Language: English - Date: 2009-10-19 10:25:58
    UPDATE