Archive for July, 2010

Law governing IT in India

Cyber Law

Dear Pals, Now that we have gone through many facets of hacking let us figure something out about the law governing Information Technology (IT) in India. The cyber world is governed by the Information Technology Act, 2000 in India.

Generating Shellcode using Metasploit


What is Shellcode?? Shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability.  It is called “shellcode” because it typically starts a  shell/command prompt  from which the attacker can control the compromised machine.

How to find addresses to overwrite EIP??


While developing exploit, we need to overwrite EIP( Extended Instruction pointer) to change the flow of execution of program. Note: EIP contains the address of the memory which the processor is going to execute. Generally EIP is overwritten with the address of instructions like jmp esp, call , push ret etc. which point to our […]