Can we code addresses indirectly, create it on a register then use it?
It is easy on an x86 but, can it be done on an ARM?
And another question, how will we trigger the shell code?

Baha

On 17/02/2009, 3mpty <[email protected]> wrote:
>> Target address range is 0x22000000 to 0x2203fff (SRAM)
>
> The second number is 0x22003FFF or 0x2203FFF0? A digit is missing (am I
> wrong?)
>
> Well, there's a problem if the address start with 0x2200 because,
> yeah, this is the code for "... and this will stop the parsing of the
> link and so the shellcode doesn't get copied into memory and won't
> cause the overflow (even if I'm not sure of this).
> An alternative solution could be to find some place in the memory
> where there's a branch instruction to this location and place its
> address in the payload of the exploit, but I don't think we'll ever
> find an instruction of that kind (Jump into stack isn't common).
>
> Also, can someone report what was written on IRC for people like me
> that weren't connected? Thank you.
>
> Paolo
>
> _______________________________________________
> Linux4nano-dev mailing list
> [email protected]
> https://mail.gna.org/listinfo/linux4nano-dev
> http://www.linux4nano.org
>

_______________________________________________
Linux4nano-dev mailing list
[email protected]
https://mail.gna.org/listinfo/linux4nano-dev
http://www.linux4nano.org

Reply via email to