The guys at the Exploit Database posted an awesome writeup on a Winamp 5.58 Exploit Development storming session – with some really cool results. In the end, they ended up writing a short assembly sequence to walk through the payload and replace bad characters with original shellcode bytes. Read more – Winamp 5.58 from Dos to Code Execution
Winamp 5.58 Exploit Development
Jump Start your InfoSec Career Today!
|PWK For those who need to acquaint themselves with the world of offensive information security.|
|CTP In-depth examination of the vectors used by today’s attackers to breach infrastructure security.|
|AWE Offensive Security’s most demanding and challenging Windows exploitation course.|
|AWAE Take a deep dive deep into the realm of advanced web application penetration testing.|
|Wi-Fu Learn to conduct effective attacks against wireless networks of varying configurations.|