lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 12 Jan 2012 10:18:53 GMT From: geinblues@...il.com To: bugtraq@...urityfocus.com Subject: SafeSEH+SEHOP all-at-once bypass explotation method principles Hello, I wrote this to introduce a small paper for my exploitation method of SafeSEH+SEHOP bypass in Oct, 2010. (http://www.x90c.org/SEH all-at-once attack.pdf, http://www.exploit-db.com/exploits/15184) Sadly it's not portable. But leave some thoughts about the method. - SafeSEH+SEHOP all-at-once bypass explotation method principles http://www.x90c.org/SafeSEH+SEHOP principles.pdf - sehop_chain_validation.c (Reverse Engineering code) http://www.x90c.org/RE_SEHOP_chain_validation.txt
Powered by blists - more mailing lists