lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <427108771.20031029113450@ysgnet.com> From: npguy at ysgnet.com (npguy) Subject: win32 stack bof & shellcode size Hi, are there any techniques to execute the shellcode if the necessary opcodes cannot fit after the return address! the return address is overwritten with an address of "jmp esp"! some says its not possible, is it? TIA -- npguy mailto:npguy@...net.com