• RSS
  • Twitter
  • FaceBook

Security Forums

Log in

FAQ | Search | Usergroups | Profile | Register | RSS | Posting Guidelines | Recent Posts

resolving the exploitable function name

Users browsing this topic:0 Security Fans, 0 Stealth Security Fans
Registered Security Fans: None
Post new topic   Reply to topic   Printer-friendly version    Networking/Security Forums Index -> Exploits // System Weaknesses

View previous topic :: View next topic  
Author Message
jake2891
Just Arrived
Just Arrived


Joined: 20 Mar 2010
Posts: 0


Offline

PostPosted: Mon Mar 22, 2010 12:08 am    Post subject: resolving the exploitable function name Reply with quote

if reversing a function that has an flaw in ida pro. and the function names just states sub_408.... how would one know when writing the exploit to attack this function what the function name is to call? thanks
Back to top
View user's profile Send private message
gnix
Just Arrived
Just Arrived


Joined: 11 Dec 2009
Posts: 0


Offline

PostPosted: Mon Apr 05, 2010 7:40 am    Post subject: Reply with quote

In a binary file there are no function names; only address like 0x12345678. For this reason, there is no need to know the name of a function. You only have to know the address. For example, to call a specific function, you will have to use the following instruction:

Code:
call address


where address is the address of the first instruction of the "unknown" function that you want to call.

gnix
Back to top
View user's profile Send private message
Display posts from previous:   

Post new topic   Reply to topic   Printer-friendly version    Networking/Security Forums Index -> Exploits // System Weaknesses All times are GMT + 2 Hours
Page 1 of 1


 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum

Community Area

Log in | Register