Because POP POP RETN is a sequence of instructions needed in order to create SEH (Structured Exception Handler) exploits.
In the process command of POP POP RETN :
Each time a POP command running 1 time, ESP is moved towards higher addresses by one position (1 position = 4 bytes for a 32-bit architecture). Each time a RET occurs, the contents of the address ESP points at are put in EIP and executed.
So, we need to escape from SEHandler with POP POP RETN.
1. POP (first) ==> Pointer next SEH record
2. POP ( second ) ==> Pointer to Exception Handler
3. RETN ==> contents of the address ESP points at are put in EIP and executed.
No comments:
Post a Comment