lo all, So I've decided to take the dive into writing windows based (memory) exploits *shudders*, I'm having some serious complications regarding shellcode and well, how to go about writing it. Is there some solid documentation on the function of LoadLibraryA/GetProcAddress handlers/functions? Also if anyone has a good disassembly of any of the connected back shellcodes (Dark Spyrit:null.printer/David Litchfield's:sql hello) I would appreciate getting my hands on them. Most of the NT Overflow papers I see are based on old versions of windows (nt4) or the examples are completely outdated. It seems that most of these papers do not give a good explanation of the importance of the LoadLibraryA/GetProcAddress calls. Maybe I am missing something, probably am... This is not as easy as unix land and for someone who codes only in *nix environments, I'm finding Windows API's well, terrifying. Thanks for any information, -wire _____________________________ For the best comics, toys, movies, and more, please visit <http://www.tfaw.com/?qt=wmf> -------------------------------------------------------------- Costs are climbing and complaints are rising as SPAM overloads your e-mail servers and Inboxes SurfControl E-mail Filter puts the brakes on spam & viruses and gives you the reports to prove it. http://www.securityfocus.com/SurfControl-pen-test2 Download a free trial and see just what's going in and out of your organization. --------------------------------------------------------------
This archive was generated by hypermail 2b30 : Wed Apr 09 2003 - 17:22:58 PDT