prana5f4
Rabu, 26 Agustus 2015
EXSPLOIT BUFFER OVERFLOW
1. into the terminal
and then type
the command " ./pattern_create.rb 1000 "
2.
then
copy
the command
that appears
to change
in
fuzzer.py
3.
then
on windows
ftp
and
debugger
run the
war
as a tool
to
see
its
EIP
address
Tidak ada komentar:
Posting Komentar
Posting Lebih Baru
Posting Lama
Beranda
Langganan:
Posting Komentar (Atom)
Tidak ada komentar:
Posting Komentar