linux-c-programming.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* Re: A exploitable C program
@ 2002-07-14  9:22 jnf
  0 siblings, 0 replies; 7+ messages in thread
From: jnf @ 2002-07-14  9:22 UTC (permalink / raw)
  To: Elias Athanasopoulos, ashtrax; +Cc: linux-c-programming

for starts i would go with what Elias had to say, if you dont understand anything of it, perhaps you should start a little higher and just concentrate on the system. c/asm would be where i focused, and i would get handy with a debugger.

here is a link to a paper that i think helps ease people into buffer overflows better than smashing the stack, as i think smashing the stack kinda assumes a basic knowledge of whats going on to some degree, i dunno their both great papers:

http://minimum.inria.fr/%7Eraynal/full-page.php3?page=116

and then these are what ive been working on and i think their the coolest thing since, well i dunno what- but i enjoy them alot:

http://community.core-sdi.com/~gera/InsecureProgramming/

really beyond how c and how those calls in c break into asm, i highly advice you understand the stack and how instructions that manipulate it work...bla bla bla im not gonna say anything you cant learn from reading

_____________________________________________________________
Sign up for FREE email from DoItYourself.com at http://doityourself.com

_____________________________________________________________
Promote your group and strengthen ties to your members with email@yourgroup.org by Everyone.net  http://www.everyone.net/?btn=tag

^ permalink raw reply	[flat|nested] 7+ messages in thread
* RE: A exploitable C program
@ 2002-07-12 14:49 Huber, George K CECOM RDEC STCD SRI
  0 siblings, 0 replies; 7+ messages in thread
From: Huber, George K CECOM RDEC STCD SRI @ 2002-07-12 14:49 UTC (permalink / raw)
  To: 'ashtrax', linux-c-programming

You might want to check out the following two books,

(1) Writing Secure Code
    Michael Howard, Davbid Leblanc
    ISBN: 0735615888
    published Nov 2001.

(2) Building Secure Software: How to Avoid Security Problems the Right Way
    John Viega, Gary McGraw
    ISBN: 020172152X
    published Oct 2001.

Both have extensive sections on buffer overflows (how to manipulate
them and how to fix/prevent them).  The first book focuses on Microsoft
technologies (MS VC++, Visual Basic, C#), but the concepts should be
widely applicable.  The second book is more general. 


George Huber
Computer Scientist
SRI, International
phone: 732-427-8064
fax    : 732-427-2065
cell   : 732-740-4018
george.huber@mail1.monmouth.army.mil

George Huber
Computer Scientist
SRI, International
phone: 732-427-8064
fax    : 732-427-2065
cell   : 732-740-4018
george.huber@mail1.monmouth.army.mil


-----Original Message-----
From: ashtrax [mailto:xlp@emtel.net.co]
Sent: Friday, July 12, 2002 12:34 AM
To: linux-c-programming@vger.kernel.org
Subject: A exploitable C program


Hi, I keep trying to understand buffer overflow, I would like you help me
finding a exploitable C program, not so complex, that demands me a serious
and deep analysis of how find shellcode, elf disamble and other process I
already ignore.
I want to have the ability of release proof of concept exploit and
understand credentials, setiud root and all secure programming topics.
What program do you suggest for have a good start?

bye.
p.s. Why I cant 'get' with majordomo all the list archives? (get
linux-c-programming <date>)



-
To unsubscribe from this list: send the line "unsubscribe
linux-c-programming" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply	[flat|nested] 7+ messages in thread
* A exploitable C program
@ 2002-07-12  4:33 ashtrax
  2002-07-12 10:01 ` Elias Athanasopoulos
  0 siblings, 1 reply; 7+ messages in thread
From: ashtrax @ 2002-07-12  4:33 UTC (permalink / raw)
  To: linux-c-programming

Hi, I keep trying to understand buffer overflow, I would like you help me finding a exploitable C program, not so complex, that demands me a serious and deep analysis of how find shellcode, elf disamble and other process I already ignore.
I want to have the ability of release proof of concept exploit and understand credentials, setiud root and all secure programming topics.
What program do you suggest for have a good start?

bye.
p.s. Why I cant 'get' with majordomo all the list archives? (get linux-c-programming <date>)




^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2002-07-15 17:41 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2002-07-14  9:22 A exploitable C program jnf
  -- strict thread matches above, loose matches on Subject: below --
2002-07-12 14:49 Huber, George K CECOM RDEC STCD SRI
2002-07-12  4:33 ashtrax
2002-07-12 10:01 ` Elias Athanasopoulos
2002-07-12 20:30   ` ashtrax
2002-07-13  8:27     ` Elias Athanasopoulos
2002-07-15 17:41     ` Marius Nita

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).