Hoy repartimos copias firmadas por el staff de @phrack en Primavera Hacker en Santiago. Keep hacking! 🏴☠️
| weblog | https://isra.cl |
Introduction This post describes a simple trick to copy arbitrary assembly/shellcode (Linux x86_64) into a mapped memory address and then execute it on-the-fly as if it were an external subroutine, no compiling or extra tools needed (based on Perl hacking I: PEEK & POKE & XSUB). Copying payload into memory Two things are needed for copying an assembly/shellcode payload into memory: a temporary file with the given payload and two syscalls to map a new memory area and read the temporary file...