Questions about this topic? Sign up to ask in the talk tab.

Difference between revisions of "Main Page/Featured Article"

From NetSec
Jump to: navigation, search
m (Protected "Main Page/Featured Article" ([edit=sysop] (indefinite)))
Line 1: Line 1:
<center><big>'''Unsafe String Replacement'''</big></center>
+
<center><big>'''Alphanumeric Shellcode'''</big></center>
  
Unsafe string replacement occurs when a replacement call is used to remove a series of text longer than one character from a string, invoked only once, to sanitize it. Because string replacement (str_replace in PHP, =~ s/// in Perl, etc) functions only do a single replacement, it is necessary to loop over them until all unsafe characters or strings are removed if you are replacing more than a single character. This also applies to replacements powered by regular expressions.
+
Alphanumeric shellcode is similar to ascii shellcode in that it is used to bypass character filters and evade intrusion-detection during buffer overflow exploitation.
 +
This article documents alphanumeric code on multiple architectures, but primarily the 64 bit x86 architecture.
  
<center>'''''[[Unsafe string replacement|Learn more - Unsafe string replacement]]'''''</center>
+
<center>'''''[[Alphanumeric shellcode|Learn more - Alphanumeric shellcode]]'''''</center>

Revision as of 16:32, 4 June 2012

Alphanumeric Shellcode

Alphanumeric shellcode is similar to ascii shellcode in that it is used to bypass character filters and evade intrusion-detection during buffer overflow exploitation. This article documents alphanumeric code on multiple architectures, but primarily the 64 bit x86 architecture.

Learn more - Alphanumeric shellcode