‘How Shellcodes Work’

Summary

Peter Mikhalenko wrote a nice article explaining step-by-step how to write shell code to and to use it in exploits.’

Credit:

‘The original article can be found at: http://www.linuxdevcenter.com/lpt/a/6590


Details

”It’s not an easy task to find a vulnerable service and find an exploit for it. It’s also not easy to defend against users who might want to exploit your system, if you are a system administrator. However, writing an exploit by yourself, to convert a news line from bug tracker into a working lockpick, is much more difficult. This article is not a guide on writing exploits, nor an overview of popular vulnerabilities. This is a step-by-step guide on developing a shellcode, a crucial point of any exploit software. Hopefully, learning how they work will help conscientious and respectable developers and system administrators to understand how malefactors think and to defend their systems against them…’

Read full article here:
http://www.linuxdevcenter.com/lpt/a/6590

Categories: Reviews