home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   alt.2600.hackers      Pretty sure it ain't about the Atari...      12,449 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 11,261 of 12,449   
   Auric__ to All   
   Re: Buffer overflow example   
   19 Feb 08 14:45:29   
   
   c8dc49ba   
   From: not.my.real@email.address   
      
   On Mon, 18 Feb 2008 17:53:55 GMT,  wrote:   
      
   > Hello I got this code from Aleph one's document posted in   
   > phrack....I want to somehow see how this program create the   
   > environment variable $EGG and then I execute my vulnerable program   
   > in this shell and get the result.   
      
   [snip]   
      
   > But for some reason it is always giving segmentation fault....can   
   > you see what is the mistake....   
   > From what i understood from this program, you are getting the esp   
   > address and after subtracting the offset, you are filling the ret   
   > address with it....   
   > But when I run in my linux system with gcc 4.2.1 I am getting   
   > different stack pointers and hence not having enough luck to   
   > execute my shellcode...   
   > Any help will be appreciated....   
   > If this mail doesnt belong to this group, I would be grateful if   
   > you can forward this to the right group.   
   > Thanks,   
   > Digi.   
      
   I would have to guess that your code takes advantage of some bug in an   
   older kernel, glibc, gcc, or [something else that lives in *lib or *bin]   
   that has since been fixed.   
      
   (Also, I don't trust anything that contains shellcode. Bad juju. If   
   you're going to run this, I suggest a biohazard box.)   
      
   --   
   ...and don't call tech support!   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca