ollyuni
Exploit writing tutorial part 7 : Unicode – from 0x00410041 to calc
Finally … after spending a couple of weeks working on unicode and unicode exploits, I’m glad and happy to be able to release this next article in my basic exploit writing series : writing exploits for stack based unicode buffer overflows (wow – that’s a mouthful). You may (or may not) have encountered a situation […]
Posted in 001_Security, Exploit Writing Tutorials, Exploits | Tagged 00410041, 0x00410041, 0x06, 0xeb, alpha2, BufferRegister, Building IA32 'Unicode-Proof' Shellcodes, chris anley, code page, Creating Arbitrary Shellcode in Unicode Expanded string, dave aitel, decoder, eax, eip, exploit, fx, msfencode, MultiByteToWideChar, nseh, null bytes, ollyuni, prepend, pvefindaddr, seh, shellcode, skylined, unicode, unicode jump seh, utf-16, utf-7, utf-8, venetian, vense.pl
Corelan Training
We have been teaching our win32 exploit dev classes at various security cons and private companies & organizations since 2011
Check out our schedules page here and sign up for one of our classes now!
Check out our schedules page here and sign up for one of our classes now!
Donate
Want to support the Corelan Team community ? Click here to go to our donations page.
Want to donate BTC to Corelan Team?
Your donation will help funding server hosting.
Your donation will help funding server hosting.
Corelan Team Merchandise
You can support Corelan Team by donating or purchasing items from the official Corelan Team merchandising store.
Corelan on Slack
You can chat with us and our friends on our Slack workspace: