[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <3F54AE73.5000704@snosoft.com>
From: dotslash at snosoft.com (KF)
Subject: PPC OSX Shellcode ASM
Nice paper... even though you reference Ghandi at the bottom you may
wanna give specific credit to him for your null free technique...
;; Use the magic offset constant 268 because it makes the
;; instruction encodings null-byte free.
addi r31, r31, 268+36
addi r3, r31, -268 ; r3 = path
http://www.dopesquad.net/security/shellcode/ppc/execve_binsh.s
And If I remember correctly that army.mil webserver is a m68k not ppc...
-KF
> llo there,
> Please find attached my paper
> on designing shellcodes on the PowerPc architecture.
>
> The paper outlines PowerPC architecture fundementals,
> and methods of deriving working shellcodes for the
> exploitation of vulnerabilities discovered on the OSX
> and Darwin Operating Systems.
>
> Very sorry if this considered OFF TOPIC please excuse.
>
> Kind Regards
>
> B-r00t.
>
>
Powered by blists - more mailing lists