Consider, for example, the following hexadecimal values: 6A0068B0FB110068D5FB11006A00FF1588204000 If these characters are interpreted as ASCII values (text), we have the following string: jh°ûhÕûjÿˆ @ If these characters are a part of an image, an audio file, an executable, or a data file, these values can be interpreted as almost anything.
THE USE OF “IMPLIED WARRANTY” AND CERTAIN “EXCLUSIONS” VARIES FROM STATE TO STATE, AND MAY NOT APPLY TO THE PURCHASER OF THIS PRODUCT. 10 Downer Avenue Hingham, Massachusetts 02043 781-740-0400 781-740-8816 (FAX) [email protected] book is printed on acid-free paper. Library of Congress Cataloging-in-Publication Data Thompson, Herbert H. For years, consumers have ignored the existence of software flaws, and the response to their existence by the IT industry has been the creation of defenses at the perimeter of the network.
Michael Howard and Pete Krawczyk provided out- standing input and criticism as technical reviewers.
This particular block of code (see Table 1.1 for an interpretation of the block) launches a Windows message box, In the strictest sense, this is not “shellcode” because it doesn’t launch a shell.
The term has evolved, however, to be used interchangeably with hexa- decimal machine instructions that are executed through a vulnerability like a buffer overflow.
THE SOFTWARE VULNERABILITY GUIDE LIMITED WARRANTY AND DISCLAIMER OF LIABILITY THE CD-ROM THAT ACCOMPANIES THE BOOK MAY BE USED ON A SINGLE PC ONLY. Richard Ford of Florida Tech helped review the earliest drafts of our ideas.