resolving the exploitable function name

Networking/Security Forums -> Exploits // System Weaknesses

Author: jake2891 PostPosted: Mon Mar 22, 2010 12:08 am    Post subject: resolving the exploitable function name
    ----
if reversing a function that has an flaw in ida pro. and the function names just states sub_408.... how would one know when writing the exploit to attack this function what the function name is to call? thanks

Author: gnix PostPosted: Mon Apr 05, 2010 7:40 am    Post subject:
    ----
In a binary file there are no function names; only address like 0x12345678. For this reason, there is no need to know the name of a function. You only have to know the address. For example, to call a specific function, you will have to use the following instruction:

Code:
call address


where address is the address of the first instruction of the "unknown" function that you want to call.

gnix



Networking/Security Forums -> Exploits // System Weaknesses


output generated using printer-friendly topic mod, All times are GMT + 2 Hours

Page 1 of 1

Powered by phpBB 2.0.x © 2001 phpBB Group