CodeJitsu targetted Shellphish running YAN01_00016 in round 85.
eip:0x6a8a264e - ebx:0x268aa6e4
Execution control corruption via return (return to: 0xbaaaaff8).
Tracing data from eip: 0x8048e4c tracing source of memory: 0xbaaaaff8 (value: 0xbaaaafb1)
0x804956a : receive syscall (return)Execution of memory occurred that was not part of the initial text sections or an executably allocated page.
Tracing data from eip: 0xbaaaafb1 tracing source of memory: 0xbaaaafb1 (value: 0x8aa6e4bb)
0x804956a : receive syscall (return)Negotiated general register: ebx:0x268aa6e4
Tracing data from eip: 0xbaaaafbb tracing source of register: ebx (value: 0x268aa6e4)
0xbaaaafb1 : mov ebx,0x268aa6e4Curated by Lunge Technology, LLC. Questions or comments? Send us email