Vulnerability Development mailing list archives
Re: Changes in Aleph1 Smashing the Stack...
From: Christian North <cnorth () gmail com>
Date: Mon, 29 Nov 2004 14:19:50 -0600
Use JMP and CALL with a label instead of the relative address. This will use an 8 bit opval instead of a 32 bit fixed address. I believe this will make your shellcode it will look like Aleph1's when disassembled. On Fri, 26 Nov 2004 22:31:37 +0100, Florencio Cano <fcano () ono com> wrote:
Hello, I'm studying how buffer overflows work. While reading the famous article by Aleph1 Smashing the Stack for Fun and Profit I have got some problems. I think my problems are caused by changes in new versions of gcc so, where I can find information about how changes in new versions of gcc affect the stack when a function are called or how new versions affect the programming of bofs. Thanks in advance and sorry if the question is so basic. -- Florencio Cano <fcano () ono com>
Current thread:
- Re: Changes in Aleph1 Smashing the Stack... Christian North (Dec 02)