CodeJitsu targetted Shellphish running YAN01_00016 in round 82.
eip:0x60666266 - ebx:0x26c6aac4
Execution control corruption via return (return to: 0xbaaaaff8).
Tracing data from eip: 0x8048e4c tracing source of memory: 0xbaaaaff8 (value: 0xbaaaafb1)
0x804956a : receive syscall (return)Execution of memory occurred that was not part of the initial text sections or an executably allocated page.
Tracing data from eip: 0xbaaaafb1 tracing source of memory: 0xbaaaafb1 (value: 0xc6aac4bb)
0x804956a : receive syscall (return)Negotiated general register: ebx:0x26c6aac4
Tracing data from eip: 0xbaaaafbb tracing source of register: ebx (value: 0x26c6aac4)
0xbaaaafb1 : mov ebx,0x26c6aac4Curated by Lunge Technology, LLC. Questions or comments? Send us email