CodeJitsu targetted Shellphish running YAN01_00016 in round 83.
eip:0x8cc84a80 - ebx:0x4464ca8
Execution control corruption via return (return to: 0xbaaaaff8).
Tracing data from eip: 0x8048e4c tracing source of memory: 0xbaaaaff8 (value: 0xbaaaafb1)
0x804956a : receive syscall (return)Execution of memory occurred that was not part of the initial text sections or an executably allocated page.
Tracing data from eip: 0xbaaaafb1 tracing source of memory: 0xbaaaafb1 (value: 0x464ca8bb)
0x804956a : receive syscall (return)Negotiated general register: ebx:0x4464ca8
Tracing data from eip: 0xbaaaafbb tracing source of register: ebx (value: 0x4464ca8)
0xbaaaafb1 : mov ebx,0x4464ca8Curated by Lunge Technology, LLC. Questions or comments? Send us email