Flag: Tornado! Hurricane!

 Forums >>  Brainstorms - General  >>  Question about memory forensic and shellcodes

Topic created on: December 12, 2014 14:35 CST by legola .

Hello experts,
my question could seems stupid but please do not judge me :)
The question is:
If an attacker exploits a memory corruption vulnerability (or a browser one) to execute a shellcode, should i find this shellcode in the process memory through volatility after i have performed a memory dump of the system ? To better explain, if memory corruption vulnerability of iexplorer.exe is exploited and a shellcode encoded with "shigata_ga_nai" encoder is executed, should i find the pattern "D9 74 24 F4" (fnstenv GetEIP) instruction in memory dump of iexplorer.exe that i could analyze with volatility for example ? Thank you very much !!!!

No posts found under this topic.
Note: Registration is required to post to the forums.

There are 31,325 total registered users.


Recently Created Topics
Oct/23
Oct/23
Oct/23
Oct/23
Oct/23
Oct/23
Oct/23
Oct/23
Oct/23
Oct/23


Recent Forum Posts
Reverse Engineering ...
bytecod3r
Reverse Engineering ...
bytecod3r
Reverse Engineering ...
bytecod3r
Reverse Engineering ...
bytecod3r
Reverse Engineering ...
bytecod3r
let 'IDAPython' impo...
bytecod3r
Reverse Engineering ...
bytecod3r
Finding the procedur...
rolEYder
Question about debbu...
rolEYder
Identify RVA data in...
sohlow


Recent Blog Entries
halsten
Mar/14
Breaking IonCUBE VM

oleavr
Oct/24
Anatomy of a code tracer

hasherezade
Sep/24
IAT Patcher - new tool for ...

oleavr
Aug/27
CryptoShark: code tracer ba...

oleavr
Jun/25
Build a debugger in 5 minutes

More ...


Recent Blog Comments
nieo on:
Mar/22
IAT Patcher - new tool for ...

djnemo on:
Nov/17
Kernel debugger vs user mod...

acel on:
Nov/14
Kernel debugger vs user mod...

pedram on:
Dec/21
frida.github.io: scriptable...

capadleman on:
Jun/19
Using NtCreateThreadEx for ...

More ...


Imagery
SoySauce Blueprint
Jun 6, 2008

[+] expand

View Gallery (11) / Submit