Full Disclosure mailing list archives
"Fire and forget" exploits?
From: "Brendan Dolan-Gavitt" <mooyix () gmail com>
Date: Fri, 20 Oct 2006 10:34:19 -0400
Hi, I'm looking for examples of (remote) security vulnerabilities whose exploitation involves no guesswork--eg, no bruteforcing the return address, or altering your exploit based on the server's response, etc. It seems like this kind of exploit is dying out, particularly as different flavors of Linux proliferate, each with their own slightly different libc and userland; in the Windows world, however, we still find "universal" exploits that work on NT4/2k/XP over a variety of service packs. Anyways, if anyone has come across things like this, I'd greatly appreciate hearing about it. I'm working on some new methods to deliver exploits at once while minimizing recon. Thanks, Brendan Dolan-Gavitt _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- "Fire and forget" exploits? Brendan Dolan-Gavitt (Oct 20)
- Re: "Fire and forget" exploits? endrazine (Oct 20)
- Re: "Fire and forget" exploits? Bruce Ediger (Oct 20)
- Re: "Fire and forget" exploits? Marcus Meissner (Oct 20)
- Re: "Fire and forget" exploits? Nick FitzGerald (Oct 20)