lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <000901c3f929$3486a300$1f00a8c0@BADGUY> From: johncybpk at gmx.net (johnny cyberpunk) Subject: question on SEH hi steve, just finished a small paper on how to exploit SEH. it's a practical analysis of the Serv-U bug found by SST some weeks ago. with a step by step softice debugging session. hope that helps. http://www.thc.org/download.php?t=p&d=Practical-SEH-exploitation.pdf cheers, johnny cyberpunk / thc