Stack Manipulation Using POP RET
Exploiting is a very interesting topic and there are many ways of manipulating the stack. One of those ways is using the POP, RET functions. Using the "Free MP3 CD Ripper" - Exploit from my first tutorial, I would like to show how a POP RET is basically working (and displayed in IDA), since these are useful commands if the shellcode is not directly placed @ the ESP, but only some bytes away from it on the stack, like ESP+4 or ESP+8...The modified Python script helps to show how jumping to shellcode via a POP, RET will work: The .wav gets filled by our usual 4112 bytes of junk first.