Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SpiderPIC, permutation can break shellcode #1

Open
kscieslinski opened this issue Aug 27, 2022 · 0 comments
Open

SpiderPIC, permutation can break shellcode #1

kscieslinski opened this issue Aug 27, 2022 · 0 comments

Comments

@kscieslinski
Copy link

Hi, I see a small bug inside the SpiderPIC shellcode permutation program.
Many shellcodes rely on a trick to get a pointer to a string by using a call instruction followed by the string.

For example a shellcode that spawns a calc.exe will contain sush instructions:

call rbp
db 0x63
db 0x61
db 0x6c
db 0x63
db 0x00

and injecting trash instructions between them, or trying to substitude them will completely break the shellcode.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant