Nytro Posted August 4, 2012 Report Posted August 4, 2012 Bypassing SEHOPStéfan Le Berres.leberre a sysdream.comDamien Cauquild.cauquil a sysdream.comTable of contents0. Introduction...............................................................................................................31. SEHOP specifications (short version).......................................................................32. Dealing with SEHOP when exploiting a stack overflow...........................................62.1. Breaking out the classical exploitation scheme........................................................................62.2. The tricky part...........................................................................................................................73. Proof Of Concept.......................................................................................................73.1. Target program & constraints...................................................................................................73.2. crash and exploitation...............................................................................................................84. Conclusion.................................................................................................................95. Credits......................................................................................................................106. Bibliography............................................................................................................10Download:http://shell-storm.org/papers/files/760.pdf Quote