Security Basics mailing list archives
Environment use to inject shellcode
From: Daniele Endlesstars <endlesstars () gmail com>
Date: Fri, 23 Mar 2012 16:30:32 +0100
In all the basic tutorial on buffer overflow the use of an environment variable is suggested as a way to exceed the limit of a small buffer in order to hold the shellcode and, mainly, the nopsled. I've devised a naive way to avoid the limitation imposed on single environment variables by chaining several together and using the resulting large (>2 MB) nopsled to counter ASLR. I can't seem to find suggestions to do this on the web, so I'm wondering if this is this a practice so common that it's not even worth mentioning or if it's, altough not really important, something new. Can someone more expert enlighten me? Thanks, Daniele ------------------------------------------------------------------------ Securing Apache Web Server with thawte Digital Certificate In this guide we examine the importance of Apache-SSL and who needs an SSL certificate. We look at how SSL works, how it benefits your company and how your customers can tell if a site is secure. You will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates. http://www.dinclinx.com/Redirect.aspx?36;4175;25;1371;0;5;946;e13b6be442f727d1 ------------------------------------------------------------------------
Current thread:
- Environment use to inject shellcode Daniele Endlesstars (Mar 23)
- <Possible follow-ups>
- Re: Environment use to inject shellcode Daniele Endlesstars (Mar 26)