Vulnerability Development mailing list archives

Re: development of wordpad exploit (Links)


From: scut () NB IN-BERLIN DE (Sebastian)
Date: Sat, 20 Nov 1999 13:13:03 +0100


Hi.

On Sat, 20 Nov 1999, Larry W. Cashdollar wrote:

Here is a list of resources to get an idea of buffer overflows and how they
work. This is a starter for those of you who are new or foggy. Everyone
else can ignore it or read them if your bored. The first one is for
windows, the rest are for linux/unix but still applicable to this
concept.

I apologize for the mirror off my personal site but I reference these
documents so much its only natural.  All credit goes to the authors.

Also take a look at (still in beta phase) http://shellcode.org/, which has
archived some interesting articles about Win32 exploitation techniques.
(The one by dark spyrit I like most :-)

ciao,
scut / teso security
[http://teso.scene.at/]

--
- scut () nb in-berlin de - http://nb.in-berlin.de/scut/ -  - http://nb.in-berlin.de/scut/ - sacbuctd@ircnet  --
-- you don't need a lot of people to be great, you need a few great to be --
-- the best -----------------------------------------------------------------
--- nuclear arrival weapon spy agent remain undercover, hi echelon ----------



Current thread: