Page 2 of 2 FirstFirst 12
Results 11 to 18 of 18

Thread: How to cause a Core Dump from a Seg Fault and GDB (Exploit Writing)

  1. #11
    Good friend of the forums
    Join Date
    Jun 2008
    Posts
    425

    Default

    Is it an absolute address or a relative address? I wuda thought an x86 CPU used a relative address for the return address of a function. If it's a relative address, then you just have to analyse the machine code for the function and count to the location of the return address.

    If it's an absolute address though, I wouldn't know where to start.
    Whats a absolute and relative address?

  2. #12
    Junior Member
    Join Date
    Jul 2007
    Posts
    71

    Default Life

    Sorry for the delay on input. Real life showed up again.

    Compaq: I understand what you are saying; I'm just having difficulty implementing. Then again I haven't had much time to play with it.

    I'll let you know.
    Thank you both of you for your help.

    P.S. Has anyone found anything on my original questions?

  3. #13
    Junior Member
    Join Date
    Jul 2007
    Posts
    71

    Default Hibernate

    This thread is going to hibernate for a little time. Sorry about this, I really appreciate your help, but I have some other responsibilities going on right now, so the fun stuff gets put on the back burner.

    Thank you for understanding!

  4. #14
    JMC31337
    Guest

    Default To get the CORE DUMP

    all you have to do in a console window is initiate it with the following:

    ulimit -c unlimited

  5. #15
    Junior Member
    Join Date
    Jul 2007
    Posts
    71

    Default Thank you!

    I truly apologize for bring back an old thread, but I was going to let it die until I realized that I hadn't thanked people for their input. Thank you. Although I still have questions on exploit writing, I have new leads now so some more googling lies in my future and any unanswered questions will appear as new threads in order to help the forum organization.

    Thank you all for your help, I'm sorry for the delay, and I apologize for bring back a 4~ish month old thread.

  6. #16
    Moderator KMDave's Avatar
    Join Date
    Jan 2010
    Posts
    2,281

    Default

    I'd recommend you to get the Shellcoders Handbook. It gives you a good overview on how to proceed and you might find your question answered.
    Tiocfaidh ár lá

  7. #17
    Developer
    Join Date
    Mar 2007
    Posts
    6,124

    Default

    Quote Originally Posted by KMDave View Post
    I'd recommend you to get the Shellcoders Handbook. It gives you a good overview on how to proceed and you might find your question answered.
    I second this. Its a great book and simply crucial for exploit writing.

  8. #18
    Junior Member
    Join Date
    Jul 2007
    Posts
    71

    Default Thanks

    Quote Originally Posted by KMDave View Post
    I'd recommend you to get the Shellcoders Handbook. It gives you a good overview on how to proceed and you might find your question answered.
    Thanks for the reference. It seems like a pretty good book as the excerpt was well written. I'll look into it a little more. Might just be my Christmas gift to myself along with a N810.

Page 2 of 2 FirstFirst 12

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •