Hello all!

I was curious as to whether anyone could recommend reading regarding the subject of getting around GCC's stack smashing protection. I've managed to find one article on phrack (Volume 0xa Issue 0x38). Which is great reading and offered me a better understanding of what is going on under the hood.

The SSP that comes with GCC 4.3.2 (version I'm using that came with BT4 R2) still detects something is up and throws the standard

*** stack smashing detected ***:
with a backtrace and a memory map dump.

This happened even with the exact example in the article as well.

Any thoughts on the matter would be greatly appreciated. Papers regarding stack randomization and things of that nature would be greatly appreciated as well. I know I can use the -fno-stack-protector flag but I'd prefer to learn more about dealing with what appears to be a standard security measure (this is definitely an assumption though I am by no means well versed in these matters). Anything would be greatly appreciated