Title: Obfuscated Shellcode, the Wolf in Sheep's Clothing (Part 3)
Author: Don Parker
Summary: In this last part of the three part series based on shellcode obfuscation, we will actually substitute the well known NOP sled for one of a differing function. We will also see what, if any, changes are noticed by Snort.
Link: http://www.WindowSecurity.com/articles/Obfuscated-Shellcode-Part3.html
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Thursday, June 16, 2005
WindowSecurity.com - Obfuscated Shellcode, the Wolf in Sheep's Clothing (Part 3)
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment