
Security Basics mailing list archives
RE: Any reason not to use strcpy, strcat or scanf?
From: "webb wang RR" <webbwang () tampabay rr com>
Date: Tue, 13 Jul 2004 22:09:57 -0700
Most of the known buffer over flow attack techniques are based on the weakness in memory related function calls, such as strcpy, strcat, memcpy, memcat, etc... So be careful when you use them and always put extra pre-caution to make sure no memory copies or moves get beyond the alloted memory boundries. A nice intro can be found here: http://www.subterrain.net/overflow-papers/overflow_tutorial.txt Webb CyberShield Networks, Inc. Intelligent Security for a Changing World www.cybershieldnetworks.com -----Original Message----- From: A.V. [mailto:pahalial.lists () gmail com] Sent: Wednesday, July 14, 2004 4:00 AM To: Secbasics Subject: Any reason not to use strcpy, strcat or scanf? Hi, I was simply wondering after seeing the "blackhat audit" program sent to F-D whether there was actually any reason not to use these functions (strcpy/strcat/scanf) in your code. I mean, I understand why you shouldn't use scanf to i.e. process user input, but other than that? Some kind of unexpected behaviour or something? Thanks, A.V. --------------------------------------------------------------------------- Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off any course! All of our class sizes are guaranteed to be 10 students or less to facilitate one-on-one interaction with one of our expert instructors. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. Visit us at: http://www.infosecinstitute.com/courses/ethical_hacking_training.html ---------------------------------------------------------------------------- --------------------------------------------------------------------------- Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off any course! All of our class sizes are guaranteed to be 10 students or less to facilitate one-on-one interaction with one of our expert instructors. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. Visit us at: http://www.infosecinstitute.com/courses/ethical_hacking_training.html ----------------------------------------------------------------------------
Current thread:
- Any reason not to use strcpy, strcat or scanf? A.V. (Jul 14)
- RE: Any reason not to use strcpy, strcat or scanf? David Gillett (Jul 15)
- Re: Any reason not to use strcpy, strcat or scanf? Hollis Johnson (Jul 15)
- Re: Any reason not to use strcpy, strcat or scanf? Kenny (Jul 16)
- RE: Any reason not to use strcpy, strcat or scanf? webb wang RR (Jul 16)
- <Possible follow-ups>
- RE: Any reason not to use strcpy, strcat or scanf? Keller, Tim (Jul 15)
- RE: Any reason not to use strcpy, strcat or scanf? Yvan Boily (Jul 16)
- Re: Any reason not to use strcpy, strcat or scanf? markzero (Jul 16)
- RE: Any reason not to use strcpy, strcat or scanf? Yvan Boily (Jul 16)
- RE: Any reason not to use strcpy, strcat or scanf? Rocky Heckman (Jul 16)
- RE: Any reason not to use strcpy, strcat or scanf? Yvan Boily (Jul 16)