Penetration Testing mailing list archives
Exploiting C# Issues
From: "Daniel Grzelak" <daniel.grzelak () sift com au>
Date: Tue, 1 Feb 2005 12:13:49 +1100
Hi, I am currently researching exploitation techniques specific to C#. The idea behind this being the future application of such research to penetration testing. Browsing the web I have been able to identify a number of resources on secure coding guidelines for .net and C# however I was unable to locate any information on the exploitation of issues specific to C#. Obviously the standard buffer overflow and related bugs are out of the question because all memory is handled automatically, however there *must* be problems that relate only to C# and/or .Net. So my query is this - could anyone point me to some resources or perhaps provide information on the exploitation and detection of C# specific problems? Thank you in advance. Regards, Daniel Grzelak Associate SIFT www.sift.com.au P: +61 2 9236 7276 F: +61 2 9236 7271 M: +61 410 566 549 E: daniel.grzelak () sift com au Suite 2, Level 7 22 Pitt St, Sydney NSW 2000 Australia "SIFT is a leading Australian pure-play information security consulting, intelligence and training firm. We specialise in the delivery of independent advice, reviews and recommendations to the senior management of large, highly-regulated organisations."
Current thread:
- Exploiting C# Issues Daniel Grzelak (Feb 03)