Vulnerability Development mailing list archives

Re: challenge


From: Marco Ivaldi <raptor () 0xdeadbeef info>
Date: Tue, 14 Sep 2004 15:46:05 +0200 (CEST)

On Tue, 14 Sep 2004, Marco Ivaldi wrote:

Of course, it's possible to modify it to automagically get the needed 
addresses. It should also be possible to use pipe() and write() to send 
the evil buffer to the vulnerable program.

This is the popen() version. You may find other similar examples at:

http://www.0xdeadbeef.info/code/linux-x86-exploits.tgz
http://www.0xdeadbeef.info/code/solaris-sparc-exploits.tgz
http://www.0xdeadbeef.info/code/abo-exploits.tgz
http://www.0xdeadbeef.info/code/fs-exploits.tgz
http://www.0xdeadbeef.info/code/vulndev-exploits.tgz

Cheers,

-- 
Marco Ivaldi
Antifork Research, Inc.   http://0xdeadbeef.info/
3B05 C9C5 A2DE C3D7 4233  0394 EF85 2008 DBFD B707

Attachment: vuln-ex2.c
Description:


Current thread: