From mboxrd@z Thu Jan 1 00:00:00 1970 From: ashtrax Subject: Re: A exploitable C program Date: Fri, 12 Jul 2002 15:30:07 -0500 Sender: linux-c-programming-owner@vger.kernel.org Message-ID: <20020712153007.B39369@nietzsche.metrotel.net.co> References: <20020711233356.F343@nietzsche.metrotel.net.co> <20020712130106.A4048@neutrino.particles.org> Mime-Version: 1.0 Content-Transfer-Encoding: 8bit Return-path: In-Reply-To: <20020712130106.A4048@neutrino.particles.org>; from eathan@otenet.gr on Fri, Jul 12, 2002 at 01:01:06PM +0300 Content-Disposition: inline List-Id: Content-Type: text/plain; charset="us-ascii" To: Elias Athanasopoulos Cc: linux-c-programming@vger.kernel.org > > Hi, I keep trying to understand buffer overflow, I would like you help me finding a exploitable C program, not so complex, that demands me a serious and deep analysis of how find shellcode, elf disamble and other process I already ignore. > > I want to have the ability of release proof of concept exploit and understand credentials, setiud root and all secure programming topics. > > What program do you suggest for have a good start? > > Please, use a mail client with a sane wrapping. > > The most combrehensive tutorial regarding buffer overflow, AFAIK, is: > > http://www.shmoo.com/phrack/Phrack49/p49-14 Hi, each time I ask for this topic I am suggested to read that document, I have read it several times but I dont understand the concepts. ashtrax.