what you don't know can hurt you
Showing 1 - 1 of 1 RSS Feed


Posted Oct 21, 1999
Authored by Taeho Oh, Postech Laboratory for Unix Security, Postech Linux User Group

Paper on writing advanced buffer overflow exploits. The early buffer overflow exploit codes only spawn a shell ( execute /bin/sh ). However, nowadays some of the buffer overflow exploit codes have very nice features. For example, passing through filtering, opening a socket, breaking chroot, and so on. This paper will attempt to explain the advanced buffer overflow exploit skill under intel x86 linux.

tags | paper, overflow, shell, x86
systems | linux, unix
MD5 | 766c0b7ea7f39e69f2ab7dce3503415d
Page 1 of 1

Top Authors In Last 30 Days

packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By