Metasploit mailing list archives
slowly beginning to understand
From: netmask at enZotech.net (netmask)
Date: Fri, 17 Sep 2004 19:38:03 -0700 (PDT)
I agree, Neil.. This forum isn't really the place for exploit 101.. It's fairly specific to the Framework itself. I recommend posing your questions to security-basics @ security focus. Go to http://www.securityfocus.com/ to find a list of lists, and to subscribe. Thanks! (I am not the moderator.. Im not part of metasploit.. and i really dont speak for the list.. but I bet we all mutually agree)
[Arcangel] (arcangel at phreaker.net) composed today:
There is no moderator?? please... Arc. ----- Original Message ----- From: "Neil" <neil-on-metasploit at restricted.dyndns.org> To: <framework at metasploit.com> Sent: Friday, September 17, 2004 9:16 PM Subject: [framework] slowly beginning to understandHey guys, I read the articles sent to me earlier. I am beginning to understand how a network daemon can be exploited. Like in the example mem.c, there was a declaration on a variable that was statically allocated with a 64 bytecharor int. I couldn't remeber. So if we actually send more than 64 byte, the daemon experiences segmentation fault. So in that article, it used gdb to step to each instruction. This is however in the opensource world. What if we were trying to reverse engineer a Microsoft or commercial binarynetworkservice/daemon, what is the tool to use? Going back to gdb, what should we look for that identifies that a variable was set with a fixed memory allocation? Thanks guys. neil
-- netmask
Current thread:
- slowly beginning to understand Neil (Sep 17)
- slowly beginning to understand Arcangel (Sep 17)
- slowly beginning to understand netmask (Sep 17)
- Re: slowly beginning to understand Neil (Sep 17)
- slowly beginning to understand netmask (Sep 17)
- slowly beginning to understand Arcangel (Sep 17)