Title: Obfuscated Shellcode, the Wolf in Sheep's Clothing (Part 2)
Author: Don Parker
Summary: In this second part we will actually see what a NOP sled is, and looks like. Furthermore, we will use an exploit with an existing NOP sled to see how it shows up on an IDS such as Snort with a default ruleset in place.
Link: http://www.WindowSecurity.com/articles/Obfuscated-Shellcode-Part2.html
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Tuesday, June 07, 2005
WindowSecurity.com - Obfuscated Shellcode, the Wolf in Sheep's Clothing (Part 2)
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment