Vulnerability Development mailing list archives
Re: Weird shellcode issues.
From: KF <dotslash () snosoft com>
Date: Mon, 26 Nov 2001 12:08:29 -0500
Can you provide an strace or truss of the exploited binary... I am almost sure that you will find that one of the arguments to your execve() call are incorrect. In the following line: int execve (const char *filename, char *const argv [], char *const envp[]) you probably have an incorrect "char *const argv []". The strace will help determine that. example: strace -ivf ./vulnbinary <Some nops here><some shellcode here><return addys> -KF Marc Soda wrote:
I have been playing around with buffer overflows. In a couple of situations /bin/sh won't run when I successful execute my shellcode. But if change /bin/sh to /bin/ls for example, it works fine. I am on an i686 linux box, however I've seen this behavour on freebsd also. Any thoughts? -- Marc Soda ASPRE, Inc. marc () aspre net http://www.aspre.net/
Current thread:
- Weird shellcode issues. Marc Soda (Nov 26)
- Re: Weird shellcode issues. KF (Nov 26)