Vulnerability Development mailing list archives

Re: [Vuln-dev Challenge] Challenge #2


From: spacewalker <spacewalker () 0xbadc0de be>
Date: Sat, 24 May 2003 13:11:13 +0200

0wn3d. Ret into libc exploitation, no setuid() stuff, quite simple in
fact.

The challenge would have been interesting if the fopen() wasn't "a" but
create and write from beginning.

$ ./exploit 
Using system address 0x4005f531
And overwriting printf got at 0x0804971c starting by 0x08049713
sh-2.05b$ exit
exit
Segmentation fault

default offset is 5 (could vary).
spacewalker
                /* Say NO to target[n] exploits ! */

Attachment: exploit.c
Description:


Current thread: