ollyuni
Exploit writing tutorial part 7 : Unicode – from 0x00410041 to calc
Finally … after spending a couple of weeks working on unicode and unicode exploits, I’m glad and happy to be able to release this next article in my basic exploit writing series : writing exploits for stack based unicode buffer overflows (wow – that’s a mouthful). You may (or may not) have encountered a situation […]
Posted in 001_Security, Exploit Writing Tutorials, Exploits | Tagged 00410041, 0x00410041, 0x06, 0xeb, alpha2, BufferRegister, Building IA32 'Unicode-Proof' Shellcodes, chris anley, code page, Creating Arbitrary Shellcode in Unicode Expanded string, dave aitel, decoder, eax, eip, exploit, fx, msfencode, MultiByteToWideChar, nseh, null bytes, ollyuni, prepend, pvefindaddr, seh, shellcode, skylined, unicode, unicode jump seh, utf-16, utf-7, utf-8, venetian, vense.pl
Corelan Live training
Since 2011, Corelan GCV has been teaching live win32 exploit dev classes at various security cons and private companies & organizations.
You can read more about the training and schedules here
You can read more about the training and schedules here
Demand Global Change
The world needs your help !
Please take a few moments to read the "Demand Global Change Call For Action" document at
http://bit.ly/demandglobalchange
Read the full document at
http://bit.ly/demandglobalchange_full and share the message with as many people as possible.
Like the Facebook page, and SHARE it with everyone you know.

Donate
Want to support the Corelan Team community ? Click here to go to our donations page.
Want to donate BTC to Corelan Team?

Your donation will help funding server hosting.

Your donation will help funding server hosting.
Corelan Team Merchandise
You can support Corelan Team by donating or purchasing items from the official Corelan Team merchandising store.
Stay posted
Corelan on IRC
You can chat with us and our friends on #corelan (freenode IRC)