shotting.cc

DEFCON-1

HOME

WELCOME TO SHOTTING.CC



Monday

Smashing the stack for fun and profit

((void)(*)(p)())

This executes buffer pointer to hex values payload 'p'.

There are alternatives, such as using putenv(char const *) to load an environmental variable with a payload.
Only to use victim.exe that has a strcpy(la,argv[1]).

These are hacker techniques that remain shrouded in mystery. Final word is I am working on heap exploits in win NT/TEN as we speak.