Vulnerability Development mailing list archives

Re: Changes in Aleph1 Smashing the Stack...


From: Christian North <cnorth () gmail com>
Date: Mon, 29 Nov 2004 14:19:50 -0600

Use JMP and CALL with a label instead of the relative address.  This
will use an 8 bit opval instead of a 32 bit fixed address.  I believe
this will make your shellcode it will look like Aleph1's when
disassembled.

On Fri, 26 Nov 2004 22:31:37 +0100, Florencio Cano <fcano () ono com> wrote:
Hello,

I'm studying how buffer overflows work. While reading the famous article
by Aleph1 Smashing the Stack for Fun and Profit I have got some problems.
I think my problems are caused by changes in new versions of gcc so,
where I can find information about how changes in new versions of gcc
affect the stack when a function are called or how new versions affect
the programming of bofs.
Thanks in advance and sorry if the question is so basic.

--
Florencio Cano <fcano () ono com>




Current thread: