Security Basics mailing list archives

RE: Buffer Overflow problem


From: Steven Trewick <STrewick () joplings co uk>
Date: Fri, 7 May 2004 10:08:01 +0100


Hello Im new to this is list and I was hoping someone can help me.

int main(int argv,char **argc) {
        char buf[256];

        strcpy(buf,argc[1]);
}

 
is a simple program I found that was written to be overflown. 
 I've tried 
for at least 2-3 hours trying to overflow it right.

2-3 hours ? now *thats* persistence! (Ahem) :-)

Any help is appreciated.

http://www.phrack.org/show.php?p=49&a=14



</code>
The information contained in this e-mail is confidential and may be privileged, it is intended for the addressee only. 
If you have received this e-mail in error please delete it from your system. The statements and opinions expressed in 
this message are those of the author and do not necessarily reflect those of the company. Whilst Joplings Group 
operates an e-mail anti-virus program it does not accept responsibility for any damage whatsoever that is caused by 
viruses being passed.
joplings.co.uk


---------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off 
any course! All of our class sizes are guaranteed to be 10 students or less 
to facilitate one-on-one interaction with one of our expert instructors. 
Attend a course taught by an expert instructor with years of in-the-field 
pen testing experience in our state of the art hacking lab. Master the skills 
of an Ethical Hacker to better assess the security of your organization. 
Visit us at: 
http://www.infosecinstitute.com/courses/ethical_hacking_training.html
----------------------------------------------------------------------------


Current thread: