From: John Foust <>
Date: Wed Jan 5 07:01:33 2005

At 12:07 AM 1/5/2005, Tom Jennings wrote:
>On Mon, 3 Jan 2005, John Foust wrote:
>>This reminds me of the constraints on today's exploits and code
>>injection techniques:
>That sounds a bit much for the task at hand... !

Of course, in this case, your simple jump at the end would
do the trick.

>>At 02:37 PM 1/3/2005, Tom Jennings wrote:
>debug will assemble for you! It jsut won't do symbols.

And in your code, we'd need to know COMPORT, RDA, DATAPORT
and theexactsizeofKERMIT. Not remembering enough low-level DOS
myself, are the first three constants or something from a
BIOS call?

>I am surprised that no one pointed out that the input, store, incremnt
>could more easily be done by:

Who was the one talking about overkill and excessive optimization? :-)

- John
Received on Wed Jan 05 2005 - 07:01:33 GMT

This archive was generated by hypermail 2.3.0 : Fri Oct 10 2014 - 23:37:43 BST