Vulnerability Development mailing list archives
Stack-based buffer overflow exploitation techniques
From: Carlos Eduardo Santiviago <segfault () brturbo com>
Date: 12 Jan 2004 18:28:13 -0000
Hello,
supposing this simple vuln code:
int main(int argc, char *argv[])
{
char buf[128];
strcpy(buf, argv[1]);
return 0;
}
I am doing a research about stack-based exploitation techniques and i know 4 ways to do it (to help me overwrite saved
eip/ebp):
1. using nop sled (P49-14)
2. using environment variables (murat, netric.org)
3. using ptrace() (RaiSe's linuxconfig exploit)
4. returning-into-libc
The question is: is there any other way to exploit it?
thanks,
--
/sf
Current thread:
- Stack-based buffer overflow exploitation techniques Carlos Eduardo Santiviago (Jan 13)
