{"provider_name":"Hatena Blog","blog_url":"https://inaz2.hatenablog.com/","image_url":null,"provider_url":"https://hatena.blog","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Finaz2.hatenablog.com%2Fentry%2F2014%2F07%2F06%2F163219\" title=\" Metasploit pattern\u306b\u3088\u308bEIP\u307e\u3067\u306e\u30aa\u30d5\u30bb\u30c3\u30c8\u8a08\u7b97 - \u3082\u3082\u3044\u308d\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","description":"\u30b9\u30bf\u30c3\u30af\u30d0\u30c3\u30d5\u30a1\u30aa\u30fc\u30d0\u30fc\u30d5\u30ed\u30fc\u8106\u5f31\u6027\u304c\u5b58\u5728\u3059\u308b\u72b6\u6cc1\u306b\u304a\u3044\u3066\u3001\u9001\u308a\u8fbc\u3080\u6587\u5b57\u5217\u3068\u5b9f\u969b\u306b\u66f8\u304d\u5909\u308f\u3063\u305fEIP\u3092\u6bd4\u3079\u308b\u3053\u3068\u3067\u3001EIP\u307e\u3067\u306e\u30aa\u30d5\u30bb\u30c3\u30c8\u3092\u8a08\u7b97\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3002 \u3053\u3053\u3067\u306f\u3001Metasploit pattern\uff08\u3042\u308b\u3044\u306fcyclic pattern\uff09\u3068\u547c\u3070\u308c\u308b\u6587\u5b57\u5217\u3092\u4f7f\u3063\u305f\u30aa\u30d5\u30bb\u30c3\u30c8\u8a08\u7b97\u3092\u3084\u3063\u3066\u307f\u308b\u3002 \u74b0\u5883 Ubuntu 12.04 LTS 32bit\u7248 $ uname -a Linux vm-ubuntu32 3.11.0-15-generic #25~precise1-Ubuntu SMP Thu Jan 30 17:42:40 UTC 2014 i686 i686 i386 GNU/Li\u2026","author_url":"https://blog.hatena.ne.jp/inaz2/","blog_title":"\u3082\u3082\u3044\u308d\u30c6\u30af\u30ce\u30ed\u30b8\u30fc","type":"rich","author_name":"inaz2","categories":["Exploit"],"title":" Metasploit pattern\u306b\u3088\u308bEIP\u307e\u3067\u306e\u30aa\u30d5\u30bb\u30c3\u30c8\u8a08\u7b97","version":"1.0","url":"https://inaz2.hatenablog.com/entry/2014/07/06/163219","width":"100%","published":"2014-07-06 16:32:19","height":"190"}