in reply to Re^3: Finding stack addresses
in thread Finding stack addresses
I could go into a lot of detail here, but I guess it would be mostly off-topic.
However generally a successful buffer overflow attack requires two things:
Once you've written past the end of the buffer to be overflowed, and modified the saved "return address" value you want to write the address of your shellcode there. The net result is that once the buffer is overflown your own code gets executed, and you win!
Traditionally this is done by saving the code to execute in an environmental variable - which will exist in all processes spawned by a parent shell, and which won't move around.
So the process becomes:
Or you could cheat and use a pre-made tool to do all the work ..
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
Re^5: Finding stack addresses
by Joost (Canon) on Sep 18, 2006 at 21:24 UTC |