Hey, second installament of HOON, with calls and jmps pretty much fully working. anyway, there is going to be alot of sub-methods goin into HOON in the next few releases as it shifts to accomodate people trying to exploit stuff. some possibilities are unicode shellcode creation (although the rest of the artcles sucked - PHraCk that is...). anyway, here's a little demo to suck you in. C:\HOON> python hoon.py <-- TOKENS --> [INSTRUCTION] [REGISTER] [REGISTER] : xorl %eax,%eax [INSTRUCTION] [REGISTER] [REGISTER] : xorl %esp,%esp [INSTRUCTION] [REGISTER] [REGISTER] : xorl %ebx,%ebx <-- ENDTOKEN --> <-- SHELLCODE --> char sc[]="\x33\xc0\x33\xc0\x33\xc0"; <-- ENDSHELLCODE --> \x33\xc0\x33\xc0\x33\xc0 mmmkay was the only thing on my prompt! get it from: http://felinemenace.org/HOON.zip http://felinemenace.org/HOON.tar FIX IT PLEASE! - nd -- http://felinemenace.org/~nd _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
This archive was generated by hypermail 2b30 : Fri Aug 15 2003 - 05:14:22 PDT