Vulnerability Development mailing list archives

Re: Blind Remote Buffer Overflow


From: mpotter () ATPCO COM (Matthew R. Potter)
Date: Sat, 29 Apr 2000 00:54:56 -0400


I'm not much of a security guru, but I really dont see how much of what
you've
put into this concept of "blind exploiting" is possible. In order to exploit
something, you need to know the vulnerability. The vulnerability has many
dependencies:

- Machine Architecture
<snip>

<snip>

While we are on the topic I have some questions:

How does one tell the diffrence in architechture remotely, when the OS runs
on multiple architechtures? Other than just taking a stab at it untill it
works. Assuming you arent on the same physical network segment and can run
ARP and see the MAC adress of the target. How does one tell the diffrence
between x86 or SPARC, etc. Byte ordering? If thats at all possible to get
the machine to disclose that across a network. I wonder if it would be
possible to tell the diffrence of 4 NetBSD or OpenBSD machines with all
diffrent architechtures. Then again is it even worth it.

Matt.


Current thread: