All of lore.kernel.org
 help / color / mirror / Atom feed
* Generating shellcode at compile time
@ 2004-12-16  3:55 John Richard Moser
  0 siblings, 0 replies; only message in thread
From: John Richard Moser @ 2004-12-16  3:55 UTC (permalink / raw)
  To: linux-gcc

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I need to generate some sort of strcpy()able shell code.  Probably
something to do

_exit(255);

would be quite enough; though more in-depth demonstrations would benefit
from being able to actually display a live exploit.  Something like
calling exec("/bin/bash") for example.

I'm working on an x86-64, but would like to be able to demonstrate
exploits and what PaX and the IBM stack smash protector do to stop them
on x86-64, x86, SPARC, PPC, SPARC64, and PPC64.

In the worst case, each shellcode could be individually created and
passed as a reaction to having the example daemon reveal the host type
(which may be useful in dual-host demonstrations where I could exploit a
PPC with an x86); however, I have not the time nor the need to invest my
time in generating such shellcode myself.

I'm not so sure what I want to do, but _exit(255) is fine for my
regression tests.

- --
All content of all messages exchanged herein are left in the
Public Domain, unless otherwise explicitly stated.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFBwQcjhDd4aOud5P8RAl+vAJ40ThT0vaa3iyhCp/EgwsNhYp/8nQCfdVpU
Xv/XTZSogpCMgBI/j0mxqa8=
=5SD4
-----END PGP SIGNATURE-----

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2004-12-16  3:55 UTC | newest]

Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2004-12-16  3:55 Generating shellcode at compile time John Richard Moser

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.