Vulnerability Development mailing list archives
Re: challenge
From: Marco Ivaldi <raptor () 0xdeadbeef info>
Date: Tue, 14 Sep 2004 15:46:05 +0200 (CEST)
On Tue, 14 Sep 2004, Marco Ivaldi wrote:
Of course, it's possible to modify it to automagically get the needed addresses. It should also be possible to use pipe() and write() to send the evil buffer to the vulnerable program.
This is the popen() version. You may find other similar examples at: http://www.0xdeadbeef.info/code/linux-x86-exploits.tgz http://www.0xdeadbeef.info/code/solaris-sparc-exploits.tgz http://www.0xdeadbeef.info/code/abo-exploits.tgz http://www.0xdeadbeef.info/code/fs-exploits.tgz http://www.0xdeadbeef.info/code/vulndev-exploits.tgz Cheers, -- Marco Ivaldi Antifork Research, Inc. http://0xdeadbeef.info/ 3B05 C9C5 A2DE C3D7 4233 0394 EF85 2008 DBFD B707
Attachment:
vuln-ex2.c
Description:
Current thread:
- challenge fuzzy () bonbon net (Sep 14)
- <Possible follow-ups>
- Re: challenge Marco Ivaldi (Sep 16)
- Re: challenge Marco Ivaldi (Sep 14)
- Re: challenge Marco Ivaldi (Sep 14)