* Generating shellcode at compile time
@ 2004-12-16 3:55 John Richard Moser
0 siblings, 0 replies; only message in thread
From: John Richard Moser @ 2004-12-16 3:55 UTC (permalink / raw)
To: linux-gcc
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I need to generate some sort of strcpy()able shell code. Probably
something to do
_exit(255);
would be quite enough; though more in-depth demonstrations would benefit
from being able to actually display a live exploit. Something like
calling exec("/bin/bash") for example.
I'm working on an x86-64, but would like to be able to demonstrate
exploits and what PaX and the IBM stack smash protector do to stop them
on x86-64, x86, SPARC, PPC, SPARC64, and PPC64.
In the worst case, each shellcode could be individually created and
passed as a reaction to having the example daemon reveal the host type
(which may be useful in dual-host demonstrations where I could exploit a
PPC with an x86); however, I have not the time nor the need to invest my
time in generating such shellcode myself.
I'm not so sure what I want to do, but _exit(255) is fine for my
regression tests.
- --
All content of all messages exchanged herein are left in the
Public Domain, unless otherwise explicitly stated.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org
iD8DBQFBwQcjhDd4aOud5P8RAl+vAJ40ThT0vaa3iyhCp/EgwsNhYp/8nQCfdVpU
Xv/XTZSogpCMgBI/j0mxqa8=
=5SD4
-----END PGP SIGNATURE-----
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2004-12-16 3:55 UTC | newest]
Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2004-12-16 3:55 Generating shellcode at compile time John Richard Moser
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).