[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: problem in bypassing stack randomization ("call *%edx" technique)

On Fri, 5 Jan 2007, Loptr Chaote wrote:

> Modifying edx is theoretically possible via push/pop instructions..
> But finding the needed opcode combination in linux-gate.so.1 is
> (unfortunately) not possible.
This will be at randomized addresses soon anyways :)


~ perl self.pl
~ $_='print"\$_=\47$_\47;eval"';eval
~ krahmer@xxxxxxx - SuSE Security Team