Penetration Testing mailing list archives

Exploiting C# Issues


From: "Daniel Grzelak" <daniel.grzelak () sift com au>
Date: Tue, 1 Feb 2005 12:13:49 +1100

Hi,

I am currently researching exploitation techniques specific to C#. The idea
behind this being the future application of such research to penetration
testing. 

Browsing the web I have been able to identify a number of resources on
secure coding guidelines for .net and C# however I was unable to locate any
information on the exploitation of issues specific to C#. Obviously the
standard buffer overflow and related bugs are out of the question because
all memory is handled automatically, however there *must* be problems that
relate only to C# and/or .Net.

So my query is this - could anyone point me to some resources or perhaps
provide information on the exploitation and detection of C# specific
problems?

Thank you in advance.

Regards,
Daniel Grzelak
Associate
SIFT
www.sift.com.au

P: +61 2 9236 7276
F: +61 2 9236 7271
M: +61 410 566 549
E: daniel.grzelak () sift com au

Suite 2, Level 7
22 Pitt St, Sydney NSW 2000
Australia

"SIFT is a leading Australian pure-play information security consulting,
intelligence and training firm.  We specialise in the delivery of
independent advice, reviews and recommendations to the senior management of
large, highly-regulated organisations."

 



Current thread: