[<prev] [next>] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.44.0308150052140.5933-100000@felinemenace>
From: nd at felinemenace.org (ned)
Subject: HOON & shellcode again!
Hey,
second installament of HOON, with calls and jmps pretty much fully
working. anyway, there is going to be alot of sub-methods goin into HOON
in the next few releases as it shifts to accomodate people trying to
exploit stuff. some possibilities are unicode shellcode creation (although
the rest of the artcles sucked - PHraCk that is...). anyway, here's a
little demo to suck you in.
C:\HOON> python hoon.py
<-- TOKENS -->
[INSTRUCTION] [REGISTER] [REGISTER] : xorl %eax,%eax
[INSTRUCTION] [REGISTER] [REGISTER] : xorl %esp,%esp
[INSTRUCTION] [REGISTER] [REGISTER] : xorl %ebx,%ebx
<-- ENDTOKEN -->
<-- SHELLCODE -->
char sc[]="\x33\xc0\x33\xc0\x33\xc0";
<-- ENDSHELLCODE -->
\x33\xc0\x33\xc0\x33\xc0
mmmkay was the only thing on my prompt!
get it from:
http://felinemenace.org/HOON.zip
http://felinemenace.org/HOON.tar
FIX IT PLEASE!
- nd
--
http://felinemenace.org/~nd
Powered by blists - more mailing lists