Author: jake2891, Posted: Mon Mar 22, 2010 12:08 am Post subject: resolving the exploitable function name ---- if reversing a function that has an flaw in ida pro. and the function names just states sub_408.... how would one know when writing the exploit to attack this function what the function name is to call? thanks
Author: gnix, Posted: Mon Apr 05, 2010 7:40 am Post subject: ---- In a binary file there are no function names; only address like 0x12345678. For this reason, there is no need to know the name of a function. You only have to know the address. For example, to call a specific function, you will have to use the following instruction:
Code:
call address
where address is the address of the first instruction of the "unknown" function that you want to call.