How I Exploited Millennium MP3 Studio 2.0 with Shellcode Payloadby@silver.io

How I Exploited Millennium MP3 Studio 2.0 with Shellcode Payload

tldt arrow
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

Structured Exception Handler (SEH) based overflows work in many different ways. In this tutorial, we’ll be using a text file to inject the malicious payload into the vulnerable field. The exploit occurs when Millennium MP3 Studio 2.0 attempts to open files with certain extensions. We attach the Millennium process to Immunity so we can observe the buffer overflow. When an exception is raised, control will jump to the first SEH handler. This will move ESP down the stack twice and return it to EIP.

Company Mentioned

Mention Thumbnail

Coins Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - How I Exploited Millennium MP3 Studio 2.0 with Shellcode Payload
silver.io HackerNoon profile picture

@silver.io

silver.io

Engineering, hacking, surfing


Receive Stories from @silver.io

react to story with heart

RELATED STORIES

L O A D I N G
. . . comments & more!