Cybersecurity
The Basics of Exploit Development 4: Unicode Overflows
["
Introduction<\/h2>\r\n\r\n
If you have read the previous articles in this series, welcome back and keep reading. If not, I would encourage you to read those first before proceeding, as this article builds on concepts laid down in the previous installments<\/a>. In this article, we will be covering a technique similar to the one in the second installment<\/a> of this series but with the twist of the character encoding of the input being in Unicode. In order to demonstrate how to get around this impediment, we will be writing parts of the payload and doing some stack realignment manually.<\/p>\r\n\r\n