Vulnerability Development mailing list archives
Re: development of wordpad exploit (Links)
From: scut () NB IN-BERLIN DE (Sebastian)
Date: Sat, 20 Nov 1999 13:13:03 +0100
Hi. On Sat, 20 Nov 1999, Larry W. Cashdollar wrote:
Here is a list of resources to get an idea of buffer overflows and how they work. This is a starter for those of you who are new or foggy. Everyone else can ignore it or read them if your bored. The first one is for windows, the rest are for linux/unix but still applicable to this concept.
I apologize for the mirror off my personal site but I reference these documents so much its only natural. All credit goes to the authors.
Also take a look at (still in beta phase) http://shellcode.org/, which has archived some interesting articles about Win32 exploitation techniques. (The one by dark spyrit I like most :-) ciao, scut / teso security [http://teso.scene.at/] -- - scut () nb in-berlin de - http://nb.in-berlin.de/scut/ - - http://nb.in-berlin.de/scut/ - sacbuctd@ircnet -- -- you don't need a lot of people to be great, you need a few great to be -- -- the best ----------------------------------------------------------------- --- nuclear arrival weapon spy agent remain undercover, hi echelon ----------
Current thread:
- Re: development of wordpad exploit (Links) Larry W. Cashdollar (Nov 19)
- Re: development of wordpad exploit (Links) Sebastian (Nov 20)