logoalt Hacker News

dominicqtoday at 7:32 AM1 replyview on HN

:(

Sounds super 1337 and I hope it's actually possible somehow.


Replies

aa-jvtoday at 7:59 AM

Parse /proc/<pid>/maps to find the relevant target_addr in your process-under-attack. And then its a matter of:

    $ dd if=shellcode.bin of=/proc/<pid>/mem bs=1 seek=$((target_addr)) ...
See also: DDExec

https://github.com/arget13/DDexec

show 1 reply