Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
From: Enrique A. Compań Gzz. (enrique_at_virtekweb.net)
Date: Thu Oct 03 2002 - 03:47:01 CDT
Sometime ago I created a shellcode that doesn't use any hardcoded address,
it looks in the
process for them... I posted it here, but I have to find it.
My advice is too look into virii coding tutorials...
There're good tutorials around this and other very interesting subjects.
Also look for a PE format reference/tutorial.
Look for 29a magazine and also at vx.netlux.org
----- Original Message -----
From: "Gary O'leary-Steele" <garyosec-1.com>
Sent: Thursday, September 26, 2002 4:54 PM
Subject: Shell code -RVA techniques or something similar
> I am looking for documentation/tutorial on writing shell code for Windows.
> Specifically using RVA techniques or something similar to make my shell
> service pack independent.
> The problem I am experiencing is that all the exploits I have written in
> past use fixed addresses within Kernel32.dll such as the offset for
> or loadlibrarya and getprocaddress. Therefore a variation in service pack
> etc causes my exploit to fail.
> Thanks in advance.
> Kind Regards,