Title: Obfuscated Shellcode, the Wolf in Sheep's Clothing (Part 2)
Author: Don Parker
Summary: In this second part we will actually see what a NOP sled is, and looks like. Furthermore, we will use an exploit with an existing NOP sled to see how it shows up on an IDS such as Snort with a default ruleset in place.
Link: http://www.WindowSecurity.com/articles/Obfuscated-Shellcode-Part2.html
No comments:
Post a Comment