Vulnerability Development mailing list archives
Re: problem to exploit a stack overflow
From: Valdis.Kletnieks () vt edu
Date: Mon, 23 May 2005 17:23:58 -0400
On Sun, 22 May 2005 18:20:35 -0000, migalo digalo said:
hi all, first post :-D ok,ok i am trying to exploit an example of stack overflow vunerable prog:
in fact it work till the execution of the shellcode ,precisely the decode stage,so we get [+] eip <= RET_ADDRESS [+] jump esp [+] begin the shellcode execution [-] acces violation,in the decode stage:-x
You aren't trying to do this on a system that has a non-exec stack? Also, it would help enormously if you were able to identify what ASM instruction caused the access violation, and what the registers contained at the time....
Attachment:
_bin
Description:
Current thread:
- problem to exploit a stack overflow migalo digalo (May 23)
- Re: problem to exploit a stack overflow Valdis . Kletnieks (May 25)
- <Possible follow-ups>
- problem to exploit a stack overflow migalo digalo (May 25)
- Re: problem to exploit a stack overflow Daniele Milan (May 25)
- Re: problem to exploit a stack overflow 6d79676d61696c6163636f756e74 (May 25)