RCE Security
  • Home
  • About
  • Contact Us
  • Services
  • Research
Select Page

Buffer Overflow Exploitation: Jump to shellcode via PUSH ESP, RET

by Julien Ahrens | Friday, December 16, 2011 | Exploit

Another possible way to jump to shellcode is using the PUSH ESP, RET technique. If you’ve got no usable CALLs or JMPs to ESP for some reasons, you can first use a PUSH ESP to put the address of ESP onto the Stack and after that RET that value to the EIP. So this...
Next Entries »
  • X
  • RSS

Designed by Elegant Themes | Powered by WordPress