Forums before death by AOL, social media and spammers... "We can't have nice things"
|    alt.2600.hackers    |    Pretty sure it ain't about the Atari...    |    12,449 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 11,261 of 12,449    |
|    Auric__ to All    |
|    Re: Buffer overflow example    |
|    19 Feb 08 14:45:29    |
      c8dc49ba       From: not.my.real@email.address              On Mon, 18 Feb 2008 17:53:55 GMT, wrote:              > Hello I got this code from Aleph one's document posted in       > phrack....I want to somehow see how this program create the       > environment variable $EGG and then I execute my vulnerable program       > in this shell and get the result.              [snip]              > But for some reason it is always giving segmentation fault....can       > you see what is the mistake....       > From what i understood from this program, you are getting the esp       > address and after subtracting the offset, you are filling the ret       > address with it....       > But when I run in my linux system with gcc 4.2.1 I am getting       > different stack pointers and hence not having enough luck to       > execute my shellcode...       > Any help will be appreciated....       > If this mail doesnt belong to this group, I would be grateful if       > you can forward this to the right group.       > Thanks,       > Digi.              I would have to guess that your code takes advantage of some bug in an       older kernel, glibc, gcc, or [something else that lives in *lib or *bin]       that has since been fixed.              (Also, I don't trust anything that contains shellcode. Bad juju. If       you're going to run this, I suggest a biohazard box.)              --       ...and don't call tech support!              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca