Re: connect-back win32 shellcode

From: Mhal (mathias.hallosserieat_private)
Date: Sat Apr 12 2003 - 05:04:16 PDT

  • Next message: Indian Tiger: "RE: Proof of Concept Tool on Web Application Security"

    You could take a look on MSDN papers about PE file format and DBGhelp lib.
    It's a good begining I guess.
    
    Regards...
    Mhal
    
    ----- Original Message -----
    From: "wirepair" <wirepairat_private>
    To: <pen-testat_private>
    Cc: <vuln-devat_private>
    Sent: Wednesday, April 09, 2003 7:10 PM
    Subject: connect-back win32 shellcode
    
    
    > lo all,
    > So I've decided to take the dive into writing windows
    > based (memory) exploits *shudders*, I'm having some
    > serious complications regarding shellcode and well, how to
    > go about writing it. Is there some solid documentation on
    > the function of LoadLibraryA/GetProcAddress
    > handlers/functions? Also if anyone has a good disassembly
    > of any of the connected back shellcodes (Dark
    > Spyrit:null.printer/David Litchfield's:sql hello) I would
    > appreciate getting my hands on them. Most of the NT
    > Overflow papers I see are based on old versions of windows
    > (nt4) or the examples are completely outdated. It seems
    > that most of these papers do not give a good explanation
    > of the importance of the LoadLibraryA/GetProcAddress
    > calls. Maybe I am missing something, probably am... This
    > is not as easy as unix land and for someone who codes only
    > in *nix environments, I'm finding Windows API's well,
    > terrifying.
    >   Thanks for any information,
    > -wire
    > _____________________________
    > For the best comics, toys, movies, and more,
    > please visit <http://www.tfaw.com/?qt=wmf>
    >
    
    
    --------------------------------------------------------------
    Costs are climbing and complaints are rising
    as SPAM overloads your e-mail servers and Inboxes
    SurfControl E-mail Filter puts the brakes on spam & viruses
    and gives you the reports to prove it.
    http://www.securityfocus.com/SurfControl-pen-test2
    Download a free trial and see just
    what's going in and out of your organization. 
    --------------------------------------------------------------
    



    This archive was generated by hypermail 2b30 : Sat Apr 12 2003 - 13:27:46 PDT