(> Download Here <)
After downloading this exploit template, you will have to read the "ReadMe" text file to implement it in your character properly, before executing the NomiShell code loader.
Hello and welcome to my main blog!
I will keep looking for a way of displaying the homepage here...
More details will be added soon, but this is all for now, so you may take a look at the other entries.
Hello my fellow readers.
You probably noticed new engine patches that combine the functionality of 3v3 and 4v4 simul matches have been released for WinMUGEN and MUGEN 1.xx, but before proceeding to download them, you decide to know what makes these engine patches worth it.
Well, you are in the right place to know what improvements my engine patches feature, so let us begin!
(> Download Here <) |
Good evening, friends.
It has been a while since I have not talked about engine vulnerabilities, but I think this is the right time to start talking about this new vulnerability.
This research was born from Nomi's ideas about trying to overflow the ST filepath line in WinMUGEN, which motivated me to investigate said insight in M.U.G.E.N 1.00; and as expected, it is possible to perform a buffer overflow attack from there by creating a very long filepath string that overwrites the character loader's buffer region including the return address, allowing us to execute our ROP chain.
This exploit can be used on both M.U.G.E.N 1.00 and 1.1b, but the main downside is not default-processing reversible, which currently restricts its use to SuperNull:Reloader characters only.
(> More information will be added soon <)
Einherjar:
"Certain things appear to be visible, but how are you sure they actually exist?"
This is a SuperNull character, that is also a Proof-of-Concept, I have worked in collaboration with the author Nomi.
Einherjar uses the CTBOF engine vulnerability, which is not so used due to its ROP limitations, to load her shellcode in M.U.G.E.N 1.00.
Download link can be found either here or in Nomi's website Caution: It may not work on some computers, due to the way the ROP technique works, so beware of that matter. |
Good afternoon, friends.
Hmm, I never thought I would be talking about this vulnerability again, but well, let us go straight to the point.
As you can guess, this vulnerability also exists in M.U.G.E.N 1.00, but due to the NX Bit protection being active in the program, shellcodes cannot be directly executed, so it is required to use an exploit technique, known as Return-Oriented Programming, to circumvent said protection.
I have recently made an exploit that takes advantage of such vulnerability, but as there are several pointer limitations to build a ROP chain that jumps the engine back to default processing, it is currently limited to SuperNull ~ Reloader characters.
Hello, friends.
Do you want to know how an engine exploit works in detail? Do you want to know more details about a character you like? Do you want to add your research into some articles?
If that is the case, we have this page for you to check out:
Good evening, readers. This is a SuperNull exploit code loader, created by me for the author Nomi , that allows you to execute your charact...