Vulnerability Development mailing list archives
Re: Blind Remote Buffer Overflow
From: sirsyko () ISHIBOO COM (Ralph The Wonder Llama)
Date: Mon May 1 01:26:38 2000
How does one tell the diffrence in architechture remotely, when the OS runs on multiple architechtures? Other than just taking a stab at it untill itwell.. if it is a unix system and you have access to the shell, the uname -a command will do the trick: $ uname -a Linux intra 2.0.33 #2 Thu Dec 11 14:08:32 MET 1997 i586 unknown $
thats not in any way "blind attacking". If I'm not mistaken some of the network scanners like nmap will do os fingerprinting based on responses to certain types of network packets. Search the bugtraq lists at http://www.securityfocus.com for "os fingerpringing" for more info. Adam
Current thread:
- Re: Blind Remote Buffer Overflow Ex Machina (Apr 30)
- <Possible follow-ups>
- Re: Blind Remote Buffer Overflow Matthew R. Potter (Apr 30)
- Re: Blind Remote Buffer Overflow Arturo Busleiman (Apr 30)
- Re: Blind Remote Buffer Overflow Ralph The Wonder Llama (May 01)
- Re: Blind Remote Buffer Overflow Granquist, Lamont (May 01)
- Re: Blind Remote Buffer Overflow Reinier Heeres (May 02)
- Re: Blind Remote Buffer Overflow Matthew R. Potter (May 02)
- Re: Blind Remote Buffer Overflow Jani Ollikainen (May 02)
- Re: Blind Remote Buffer Overflow Granquist, Lamont (May 01)
- Re: Blind Remote Buffer Overflow Bluefish (May 01)
- Re: Blind Remote Buffer Overflow Marc (May 01)
- Re: Blind Remote Buffer Overflow Blue Boar (May 01)
- Re: Blind Remote Buffer Overflow matej (May 01)
- Re: Blind Remote Buffer Overflow Pavol Luptak (May 02)
- Ascii-x86 was: Blind Remote Buffer Overflow Bluefish (May 03)