Mailinglist Archive: opensuse-security (195 mails)

< Previous Next >
Re: [suse-security] How to decrypt shell code of an exploit?
  • From: Frank Derichsweiler <fd-l-s-s@xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx>
  • Date: Fri, 24 Mar 2000 08:01:45 +0100
  • Message-id: <20000324080145.Y8909@xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx>
On Thu, Mar 23, 2000 at 08:27:52PM +0100, Gerhard Sittig wrote:
> Just FYI if you don't get what you want with objdump(1) -- I
> don't know well this can cope with formats _not_ being produced
> by cc(1), ld(1) or ar(1), i.e. not being a supported executable
> format.

Hello Gerhard, Hello list,

I just would like to confirm the useability of nm and objdump as
posted. The shell made the following things:
Transform the string /BIN/SH (which is within the code) into /bin/sh,
put addresses etc. into the exploited buffer, call execv and perform
error checking.

Frank

< Previous Next >