Back to list
problem in bypassing stack randomization ("call *%edx" technique)
Sep 18 2006 06:32AM
Pravin (shindepravin gmail com)
I am working on vulnerabilities which will bypass stack randomization.
I came across a method ("call *%edx" technique) described in
As per my understanding, method works on the line of finding the library
which is not randomized.
then finding the instruction "call *%edx" in the assembly code of that
and pass the control to this instruction by overwriting the return address
by the address of this instruction from non-randomized library.
I do understand that control will go to that function, but How can I control
the value of "*%edx" ?
I know I can control the value of "*%esp" but how can I overwrite "*%edx" ?
and if I dont control the value of "*%edx", then how my shellcode will get
I am missing something over here, Please let me know if I am wrong
I will apriciate if someone can give me link to some detailed documentation
for "call *%edx" technique or some hint of how it works and control passes
to shellcode exactly.
[ reply ]
Copyright 2010, SecurityFocus