Professional Webmasters Community
Would you like to react to this message? Create an account in a few clicks or log in to continue.

Pwn2Own 2010 Windows 7 Internet Explorer 8 exploit

Go down

Pwn2Own 2010 Windows 7 Internet Explorer 8 exploit Empty Pwn2Own 2010 Windows 7 Internet Explorer 8 exploit

Post  andry Fri Dec 24, 2010 3:55 am

The exploit consists of two parts.
The first part figures out where a certain .dll file is loaded in the current process followed by step 2 that uses the information gathered in step 1 to trigger an exploit that uses some ret2lib technique to disable DEP for our shellcode and then redirects the program flow to the shellcode.

Download PDF
andry
andry
Moderator
Moderator

Posts : 467
Join date : 2010-05-07

Back to top Go down

Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum