Mailinglist Archive: opensuse-security (195 mails)

< Previous Next >
Re: [suse-security] How to decrypt shell code of an exploit?
  • From: Frank Derichsweiler <fd-l-s-s@xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx>
  • Date: Thu, 23 Mar 2000 11:27:01 +0100
  • Message-id: <20000323112701.L8909@xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx>
On Thu, Mar 23, 2000 at 08:34:40AM +0100, Soeren Eyhusen wrote:
> For further information on buffer overflows read phrack magazine, issue 49
> (www.phrack.com), "Smashing the stack for fun an profit".
>

Thanks a lot for that link. Excellent reading.

<20000322211105.M24822@xxxxxxxxxxxxx>; from Gerhard.Sittig@xxxxxxx on Wed, Mar 22, 2000 at 09:11:05PM +0100
On Wed, Mar 22, 2000 at 09:11:05PM +0100, Gerhard Sittig wrote:
> [use nm objdump]

Now I know some tools and have an idea how to try to analyze the whole material from the
attacker...

BTW: the attacker used pop2, the installed pop2d version was too old


Greetings,
Frank


< Previous Next >