- Now That We Know We Can Overwrite Our Rip Register And Our Rsp Register We Can Start Designing Our Exploit And Execute 1 (105.84 KiB) Viewed 23 times
Now that we know we can overwrite our RIP register and our RSP register, we can start designing our exploit and execute
-
- Site Admin
- Posts: 899603
- Joined: Mon Aug 02, 2021 8:13 am
Now that we know we can overwrite our RIP register and our RSP register, we can start designing our exploit and execute
Now that we know we can overwrite our RIP register and our RSP register, we can start designing our exploit and execute a new shell (our malicious code). First we need to get a shellcode that allows us to run a shell. Luckily there are many shellcodes we can use that we can find online for exploitation testing. We will use the following shellcode: "\x50\x48\x31\xd2\x48\x31\xf6\x48\xbb\x2f\x62\x69\x6e\x2f\x2f\x73\x68\x53\x54\x5f xb0\x3b\x0f\x05" 1) What is the size of the shellcode in bytes?/ i. This size will be important later for the exploit. Also "\" is an escape sequence and "x" means hexadecimal; therefore, \x31 is a hexadecimal 31. ii. Hint: 1 hexadecimal digit is 4-bit and 1-byte is 8-bits; therefore, how many hexadecimal digits are in 1-byte.