CodeJitsu targetted Shellphish running YAN01_00016 in round 84.
eip:0xee68a462 - ebx:0xac6a42c6
Execution control corruption via return (return to: 0xbaaaaff8).
Tracing data from eip: 0x8048e4c tracing source of memory: 0xbaaaaff8 (value: 0xbaaaafb1)
0x804956a : receive syscall (return)Execution of memory occurred that was not part of the initial text sections or an executably allocated page.
Tracing data from eip: 0xbaaaafb1 tracing source of memory: 0xbaaaafb1 (value: 0x6a42c6bb)
0x804956a : receive syscall (return)Negotiated general register: ebx:0xac6a42c6
Tracing data from eip: 0xbaaaafbb tracing source of register: ebx (value: 0xac6a42c6)
0xbaaaafb1 : mov ebx,0xac6a42c6Curated by Lunge Technology, LLC. Questions or comments? Send us email