Search:

Type: Posts; User: kanto.86; Keyword(s):

Search: Search took 0.00 seconds.

  1. Discussioni: Buffer Overflow

    by kanto.86
    Replies
    8
    Views
    2,877

    Haha! Cool !! We don't ask for this mistery of C...

    Haha! Cool !! We don't ask for this mistery of C but we are happy that everythings now work. Great ! :D
  2. Discussioni: Buffer Overflow

    by kanto.86
    Replies
    8
    Views
    2,877

    The source code appears to be ok. The only other...

    The source code appears to be ok. The only other information I have to give you is that some OS mark the stack as "not executable" (precisely to prevent stack overflow, so this is because heap...
  3. Discussioni: Buffer Overflow

    by kanto.86
    Replies
    8
    Views
    2,877

    mmm....If i've not misunderstood, your problem...

    mmm....If i've not misunderstood, your problem is the randomization of memory (kernels starting from 2.6.12 add a stack protection by default).

    type from shell (as root):



    echo 0 >...
  4. Discussioni: Buffer Overflow

    by kanto.86
    Replies
    8
    Views
    2,877

    What exactly do you need? A simple theoretical...

    What exactly do you need? A simple theoretical example with C source code and debugger or....something more complex (in this 2nd case I cannot help you) :)
  5. Discussioni: Evading NIDS

    by kanto.86
    Replies
    1
    Views
    1,485

    Ok I found it: fragtest frag-timeout ipaddress...

    Ok I found it:

    fragtest frag-timeout ipaddress

    :D
  6. Discussioni: Evading NIDS

    by kanto.86
    Replies
    1
    Views
    1,485

    Evading NIDS

    Hi everybody

    I'm trying to apply some evasion techniques to snort and other NIDS (nothing special: TTL, Fragmentation reassembly timeout, Overlapping segments).

    But, to test the fragmentation,...
Results 1 to 6 of 6