Vuln Dev
Blog Entry of Interest Dec 31 2007 09:07AM
Ben (comsatcat earthlink net)
I just updated my blog with an analysis of a level on a wargame I was playing (pulltheplug). It gives a technical overview (hopefully without ruining the level) of a successfull attack on a PAX secured system (non-exec stack) exploiting a stack buffer overflow on a statically linked multi threaded binary... thought some of you may find it of interest, plus I'm sure some of you how a much cleaner way of exploitation. I'd like to hear your ideas/feedback. Its a quick dirty write up so parden grammer/spelling.

http://www.socialnetworkwhore.com/index.php?blog=5&title=exploring_vorte
x_level_12&more=1&c=1&tb=1&pb=1

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus