mailing list archives
Re: Win32 Heap Exploits
From: "ad () heapoverflow com" <ad () heapoverflow com>
Date: Tue, 03 Jan 2006 14:27:33 +0100
-----BEGIN PGP SIGNED MESSAGE-----
or this is because the bug he's working on has already been discovered
& patched by an exception throwing the control to an handler, for
example , you will notice exactly the same thing for the WINS bug
discovered by n.waisman, if you are trying to exploit it yet on a
patched ms box within ollydbg , you will be able to congrats because
the debugger is able to handle the exception apart of the program ,
but without of course it's not possible, wins.exe throw us to another
point, so anyway I bet the bug you are working on has been already
discovered and patched.
Nicolas RUFF wrote:
But if i execute the server without ollydbg there happen nothing.
Have anybody an idea what i make wrong. Test on a winxp sp1
As pointed out multiple times, Windows heap is not the same whether
the program is flagged as "being debugged" or not.
You should always *attach* the debugger to the process and not run
the process from within the debugger.
Regards, - Nicolas RUFF
_______________________________________________ Full-Disclosure -
We believe in it. Charter:
http://lists.grok.org.uk/full-disclosure-charter.html Hosted and
sponsored by Secunia - http://secunia.com/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (MingW32)
-----END PGP SIGNATURE-----
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/