Hack of the Day: How do I run untrusted shell code?
I’ve run into a nice series of video called “hack of the day” from Vivek-Ramachandran.
In this first video he explains two techniques : * jump-call-pop * xor decoding
I also got nice tips like the examining string function in gdb : x/s $ebx
or the folder usr/include/asm
that contains plenty of information about assembly.
The full playlist can be found on securitytube.net