Vuln Dev Mode:
(Page 6 of 75)  < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >
Re: Learning buffer overflow help 2007-06-07
mailbox (at) martinelli (dot) com [email concealed] (john martinelli com)
Which version of GCC are you using?
Is VMA off?
What type of processor do you have?

Let me know the answer to those questions - I know they've tripped me
up before.

-John Martinelli
RedLevel.org Security

[ more ]  [ reply ]
Learning buffer overflow help 2007-06-06
erk_3 hotmail com
Hello everyone,

I have studied alot on buffer overflows and I understand the theory behind it. Thing is, any example I follow says once you can overwrite the EIP you can control the flow of the program (in a nutshell).

So here's my really basic BOF:

#include <stdio.h>

#include <string.h>

[ more ]  [ reply ]
Vulnerability Disclosure 2007-06-05
matt steer marstons co uk (2 replies)
Hi Guys,

I have been playing around with a program and have discovered a bug that I have successfully leveraged into code execution. I reported my findings to the vendor, not yet receiving a reply; this is the first time I have done this.

The bug is in an installer and malicious input is craf

[ more ]  [ reply ]
Re: Vulnerability Disclosure 2007-06-07
Mauro Flores (almauri cs com uy)
Re: Vulnerability Disclosure 2007-06-07
Steve Shockley (steve shockley shockley net)
Re: Re: Help developing exploit 2007-05-28
KaCo678 aol com
I was advised to use a smaller buffer.I think i had it the wrong way around for a start.

<-buffer-> <ret> <-shell-code->

aaaaaaaaaaaaaaaaaa xxxx SSSSSSSSSSSSSSSSSSSSSS

I am guna work of this and see what happens.Ok ill explain what ive done so far i worked out haw much buffer

[ more ]  [ reply ]
Re: Re: Help developing exploit 2007-05-27
KaCo678 aol com (1 replies)
Sry for the confusion English is not my main language i live in the uk..But im not english.I do try my best i will try to explain..If i look into the esp memory to find my 0x90 nop sled the adress where its at is 0013f318 but im sure im not able to use a null byte..

[ more ]  [ reply ]
Re: Help developing exploit 2007-05-28
Valdis Kletnieks vt edu
Help developing exploit 2007-05-26
KaCo678 aol com (2 replies)
Hi i was wondering if you would able to help.//I recently found a stack over flow in Ultra iso and was trying to write a local exploit for it..But im able to find the address where my nop sled is and every thing ive tried hasnt worked..And well as you seam to be a well respected member of the commun

[ more ]  [ reply ]
Re: Help developing exploit 2007-05-28
Thomas Pollet (thomas pollet gmail com)
Re: Help developing exploit 2007-05-26
Valdis Kletnieks vt edu
Re: [Full-disclosure] TCP/IP vulnerability 2007-05-23
Ivan . (ivanhec gmail com)
dude, check out Fernando Gont site

http://www.gont.com.ar/tools/icmp-attacks/index.html

cheers
Ivan

On 5/22/07, Mohit Kohli <mkohli (at) techmahindra (dot) com [email concealed]> wrote:
>
>
>
>
> Hi Guys,
>
>
>
> I got an assignment to write a white paper on TCP/IP and to show demo on how to exploits the same.
>
>
>
> I have

[ more ]  [ reply ]
TCP/IP Vulnerability 2007-05-22
mohit701 yahoo com (3 replies)
Hi Guys,

I got an assignment to write a white paper on TCP/IP and to show demo on how to exploits the same.

I have listed some of the vulnerability, but need some good tools (preferably windows based) to exploit the vulnerability and to perform further analysis.

overlapping I

[ more ]  [ reply ]
RE: TCP/IP Vulnerability 2007-05-24
Paolo Riviello www.paoloriviello.com (pao_rivi hotmail com)
Re: TCP/IP Vulnerability 2007-05-24
Roman Medina-Heigl Hernandez (roman rs-labs com)
RE: TCP/IP Vulnerability 2007-05-24
reza (reza systemconsultancy com my)
FINAL Call For Papers: Chaos Communication Camp 2007, Berlin 2007-05-22
Paul Böhm (paul boehm org)
== FINAL Call for Papers: Chaos Communication Camp 2007, Berlin ==

Chaos Communication Camp 2007
"In Fairy Dust We Trust!"
August, 8th to 12th, 2007
Airport Museum Finowfurt (Finow Airport) near Berlin, Germany

http://events.ccc.de/camp/2007/

Final Call for Paper Deadline: June 5th 2007, 23:59 CE

[ more ]  [ reply ]
program for SyScan'07 2007-05-21
organiser (at) syscan (dot) org [email concealed] (organiser syscan org)
dear all

the program for SyScan'07 is as follow:

Keynote Address - The IPO of the 0day: stock fluctuation from an
unrecognized influence by Justine Aitel (Immunity, Inc.)
Attack Surface Analysis of Blackberry Devices by James O'Connor (Symantec)
Command Injection in XML signatures and Encryption

[ more ]  [ reply ]
Remider: VNSECON 07 Call for Papers ends on June 08 2007-05-21
rd (rd vnsecurity net)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,

A reminder to everyone that the Call for Papers for the VNSECON
2007 conference in Saigon, Vietnam this August ends on the first
week of next month (June 08).

Thanks and looking forward to seeing you all there.

- --
VNSECON 07
http://conf.vnsecur

[ more ]  [ reply ]
Training Classes in SyScan'07 2007-05-09
organiser (at) syscan (dot) org [email concealed] (organiser syscan org)
dear all

besides having free alcohol for all conference attendees at SyScan'07 this year, there will be seven (7) training classes at SyScan'07 this year. these classes are:

1. "securing your oracle database form hackers" by alexander kornbrust
2. "web application (in)security" by ngs software
3.

[ more ]  [ reply ]
Weird shellcode behavior 2007-05-06
gljuposti gmail com (1 replies)
I am building an exploit (heap OF) and I am experiencing different shellcode behavior depending on the parametar I can in no way associate with this problem. For one parametar value the shellcode gets executed correctly, but for the other, there are problems.

For example, the calc.exe shellcode c

[ more ]  [ reply ]
Re: Weird shellcode behavior 2007-05-07
Jerome Athias (jerome athias free fr)
TCP segments reordering and covert channels 2007-05-05
Kototama (kototamo gmail com) (1 replies)
Hello,

The thesis "Covert Channel Analysis and Data Hiding in TCP/IP" (Kamran
Ahsan, 2002) introduced a new covert channel technique for IPsec.
Packets sorting is used to convey information. For instance the
sequence packet1 packet2 would code 0 while the sequence packet2 packet1
would code 1.

[ more ]  [ reply ]
Re: TCP segments reordering and covert channels 2007-05-07
Valdis Kletnieks vt edu (1 replies)
Re: TCP segments reordering and covert channels 2007-05-07
Kototama (kototamo gmail com)
Re: Help developing an exploit 2007-04-30
Claudio Broglia (xeon sysroot eu)
> Hi List,
Hi Webster,

> I discovered a buffer overflow in a networked application ...
> ... The problem I've been
> having is that my payload ends up at address 0x0012E6B4 and if I try
> to get that address into EIP, my entire message is rejected for
> containing an x00 character. ...
> (23 bytes

[ more ]  [ reply ]
Help developing an exploit 2007-04-29
Webster Orkin (webster orkin gmail com) (3 replies)
Hi List,

I discovered a buffer overflow in a networked application that my
company uses. I plan to notify the company that writes the program,
but I'd like to develop sample exploit code before I do so they'll
take it more seriously. I've never written exploit code, but I do
have experience with

[ more ]  [ reply ]
Re: Help developing an exploit 2007-05-01
alireza hassani (trueend5 yahoo com)
RE: Help developing an exploit 2007-04-30
Sol Z List (RaMatkal hotmail com)
Re: Help developing an exploit 2007-04-30
Felix Lindner (fx sabre-labs com)
(Page 6 of 75)  < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus