Page 1 of 1

Now that we know we can overwrite our RIP register and our RSP register, we can start designing our exploit and execute

Posted: Tue Jul 12, 2022 8:15 am
by answerhappygod
Now That We Know We Can Overwrite Our Rip Register And Our Rsp Register We Can Start Designing Our Exploit And Execute 1
Now That We Know We Can Overwrite Our Rip Register And Our Rsp Register We Can Start Designing Our Exploit And Execute 1 (105.84 KiB) Viewed 25 times
Now that we know we can overwrite our RIP register and our RSP register, we can start designing our exploit and execute a new shell (our malicious code). First we need to get a shellcode that allows us to run a shell. Luckily there are many shellcodes we can use that we can find online for exploitation testing. We will use the following shellcode: "\x50\x48\x31\xd2\x48\x31\xf6\x48\xbb\x2f\x62\x69\x6e\x2f\x2f\x73\x68\x53\x54\x5f xb0\x3b\x0f\x05" 1) What is the size of the shellcode in bytes?/ i. This size will be important later for the exploit. Also "\" is an escape sequence and "x" means hexadecimal; therefore, \x31 is a hexadecimal 31. ii. Hint: 1 hexadecimal digit is 4-bit and 1-byte is 8-bits; therefore, how many hexadecimal digits are in 1-byte.