Vulnerability Development mailing list archives
Re: shellcoding on gentoo
From: apriori () dkc-clan de
Date: 30 Jan 2006 09:40:05 -0000
I guess your function address is wrong, run "objdump /usr/lib/libc.so.5 -T | grep -w execve" to find the one for your system. by the way: a much more reliable way to run system functions is to use systemcalls. the respective number for each syscall can be found with egrep "^#define __NR" /usr/include/asm/unistd.h" or with man syscalls the number has to be in register eax, arguments in ebx following. int 0x80.
Current thread:
- Re: shellcoding on gentoo apriori (Feb 01)
- <Possible follow-ups>
- Re: shellcoding on gentoo nonexistent (Feb 07)
- Re: shellcoding on gentoo Borja (Feb 21)
- Re: shellcoding on gentoo Mike Davis (Feb 21)
- Re: shellcoding on gentoo DJ Ether (Feb 21)
- Re: shellcoding on gentoo Mike Davis (Feb 21)
- Re: shellcoding on gentoo security (Feb 22)