From SEH Overwrite with Egg Hunter to Get a Shell
2023-7-28 15:37:3 Author: hakin9.org(查看原文) 阅读量:17 收藏

Introduction The Windows operating system has a default "handler" that catches any exception that is not handled by the program. When Windows handles an exception in an application, you will usually see the message: "program has encountered a problem and needs to close". The SEH works in chain and are localized in end of stack.  In the classic Buffer Overflow (vanilla), the exploit overwrites the return address without worrying about writing more bytes in the stack, but with the SEH Overwrite technique, it is possible to obtain more space for the shellcode, in order to have a more stable exploit. In addition, Egg Hunter is a technique where a small piece of shellcode is used that searches for an actual bigger shellcode the attacker was not able to fit-in the available buffer space. For this, make use of this little piece of shellcode "egg hunter" to redirect execution flow to....

Read the rest of this story with a free account.

Sign up with Google Sign up with Facebook Sign up with email

Already have an account? Sign in

Author


文章来源: https://hakin9.org/from-seh-overwrite-with-egg-hunter-to-get-a-shell/
如有侵权请联系:admin#unsafe.sh