exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 1 of 1 RSS Feed


Posted Oct 21, 1999
Authored by Taeho Oh, Postech Laboratory for Unix Security, Postech Linux User Group

Paper on writing advanced buffer overflow exploits. The early buffer overflow exploit codes only spawn a shell ( execute /bin/sh ). However, nowadays some of the buffer overflow exploit codes have very nice features. For example, passing through filtering, opening a socket, breaking chroot, and so on. This paper will attempt to explain the advanced buffer overflow exploit skill under intel x86 linux.

tags | paper, overflow, shell, x86
systems | linux, unix
SHA-256 | 2e4ea3806ea648290a4bc015d162ee5889ff5d38e9961098e03e606b4897fb15
Page 1 of 1

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By