Penetration Testing mailing list archives

Re: buffer overflows


From: kalgecin <kalgecin () gmail com>
Date: Fri, 9 Jan 2009 14:47:51 +0300

All i did was disable the va randromization by running
"echo 0 > /proc/sys/kernel/randomize_va_space"
The inbuilt gcc protection and other means of protection were enabled.

On 1/9/09, Giuseppe Fuggiano <giuseppe.fuggiano () gmail com> wrote:
2009/1/8 kalgecin <kalgecin () gmail com>:
after reading many papers on the subject only to be disappointed to
find out that the examples don't work, i decided to write my own
please read it at <kalgecin.b0x.com>.
i need all the comments that you can offer either positive or negative.

Did you disable the stack protector compiling that examples?

--
Giuseppe Fuggiano




Current thread: