I did really enjoy reading ur previous entries & learned things i don’t know before.Thanks for this great tutorial 🙂
I guess a lot of people were struggling with unicode exploits (including myself) – but that should be history now 🙂 thanks
I’ve a stupid question, Is heap overflow also working with SEH method? If in unix-like system, how could I do SEH?
it’s not a stupid question,but : SEH is on the stack, not in the heap, so you cannot overwrite the SE record without writing on the stack Linux is different. I may write tutorials on linux in the (far) future, if I have more time
after grabs some articles, I think heap, null-byte overflow, etc.. are quite different kind of technique as stack overflow. btw, just waiting for your new tutorials, It’s really useful and cool! 😉
THANK YOU SOOOOOO mutch for writing this tutorial. You brought me into the world of security! VERY AWESOME! Dude
The link for AIMP on Softpedia is not pointing to version 2.51 Build 330 anymore. I found it on http://www.brothersoft.com/aimp-download-180914.html. I just finished the Xion exploit, next step is making one for AIMP 🙂
Just finished the exploit for AIMP2 (Windows XP SP2), took me less time than I though it would. Didn’t need to use the egghunting technique and I still have 3968 bytes for the payload.
cool – well done 🙂 Feel free to open a topic and post your own exploit in the forum (so others can learn from it)
i know its a silly question but i want to know your opinion it is good for taking VULNERABILITY RESEARCH and EXPLOIT WRITING as a CAREER because this field is so vast and i will have to deep dive into it. AND plZ in future make some VIDEO TUTORIAL SERIES also because videos teaches us a lot………..
Oh my God! I read this one three times … how you guys could understand old ones? I think I should change my course…
Thank you for the tutorial! I just started learning shellcoding and this is driving me nuts. If I overflow with A x 5000, I see “41 00 41 00 etc” in the stack. However, once I start overflowing with shellcode, for instance with bytes like “\x50\x6d\xc3”, I end up getting “50 00 6d 00 41 d3”. My “\xc3” gets converted to something else on the stack. Do u have any idea what might cause this? By the way I always pad my shellcode so they are 5000 bytes and no nulls in shellcode. Any help would be appreciated!!!
vense.pl link isn’t working anymore. Google found it for me here: http://phenoelit.org/fr/tools.html PS: I don’t think we can thank you enough for all your work. 🙂
The milw0rm link isn’t working either. The waybackmachine to the rescue: http://web.archive.org/web/20100205082112/http://milw0rm.com/exploits/6302 🙂
Working AIMP link,again from the waybackmachine (ekse’s link redirects to newer version as well) http://web.archive.org/web/20100406080131/http://www.aimp2.us/files/aimp_2.51.330.zip