Vuln Dev
Is the memory map of a process different when executed in GDB? Sep 23 2008 10:43AM
Florencio Cano (florencio cano gmail com)
I'm beggining studying deeply exploits. Now I have a problem. I'm
trying a return-to-libc exploit but I get a segmentation fault when
executed in the terminal and I get the code correctly executed when I
run it inside GDB. Does GDB alter the memory map of a process when
executed inside it? In which way? Where I can read info about this?
This is the problem:

fcano@gohan ~/ShellcodersHandbook/code/ch02 $ ./ret2libc 609 1776
Using address: 0xbfffeb08
fcano@gohan ~/ShellcodersHandbook/code/ch02 $ ./victim $BUF
Segmentation fault
fcano@gohan ~/ShellcodersHandbook/code/ch02 $ gdb ./victim
GNU gdb 6.7.1
Copyright (C) 2007 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law. Type "show copying"
and "show warranty" for details.
This GDB was configured as "i686-pc-linux-gnu"...
Using host libthread_db library "/lib/".
(gdb) r $BUF
Starting program: /home/fcano/ShellcodersHandbook/code/ch02/victim $BUF

Any ideas?

[ reply ]


Privacy Statement
Copyright 2010, SecurityFocus