On Tue, 17 Feb 2009 12:19:07 +1100, Jubei Trippataka said: > > > memset(buf, 'A', 528); That's where the original poster is starting from... > You commenting on exploitation is kind of like asking a deaf person what > their favorite song is. You obviously have no clue what you are talking > about due to the fact you offered absolutely no insight in to the protection > mechanism he was asking about, nor potential means of exploitation. Given > this the real question remains, do you actually believe you have any clue > about this stuff, or are you like Wallace and just want to post useless > shit? Given the starting point, do you *really* think the original poster would have understood an in-depth explanation of all the technical details, rather than some hints as to the next thing he needs to learn about? He's not going to get anywhere until he learns at least that there's that canary on the stack, and where it is in relation to the various variables and things like the return address. After that, yes, he faces *other* challenges. But he'll learn more by thinking through each issue on his own than if somebody hands him the whole enchilada.
Attachment:
pgpMS2KZpzAmq.pgp
Description: PGP signature
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/