First page Back Continue Last page Overview Graphics
Oh it is molested with great justice.
Theroy:
- In this attack, if you fill the [address]'es from the previous slide with shellcodes perhaps, and set your [ret] address to a call %esp instruction, you will be able to execute your shellcodes without any problems.
- A `call %esp` instruction can be found in your kernel.