Page 1 of 2 12 LastLast
Results 1 to 10 of 12

Thread: Buffer overflow

  1. #1
    Junior Member
    Join Date
    May 2007
    Posts
    82

    Default Buffer overflow

    Hi. I'm learning ASM and C n perl atm to gain more computer knowladge within the art of hacking. And all i want is when finding buffer overflows within programs that have been compiled hows do you find that an exploit can be exploited, i'm not asking to be spoon fed cause i like to learn for myself. My guess is studying an application in ASM and see if it can be exploited. Thank you for your time

  2. #2
    Member skiamakhe's Avatar
    Join Date
    Jul 2007
    Posts
    80

    Default

    Do some research on the topic of fuzzing. That'll get you started.
    σκιαμαχι

  3. #3
    Member imported_blackfoot's Avatar
    Join Date
    Jun 2007
    Posts
    386

    Default metasploit

    Use metasploit


    Study http://www.securiteam.com/securityre...OP0B006UQ.html

    Consider also a higher level scripting language (such as lua or python) rather than shellcodes as most systems now effectively trap buffer overflows. (We hope).
    Lux sit

  4. #4
    Senior Member shamanvirtuel's Avatar
    Join Date
    Mar 2010
    Location
    Somewhere in the "Ex" human right country
    Posts
    2,988

    Default

    im agree you will need to learn some procedural language before all

    lua(my little installer for bt under win was made in lua) is the best i think

    python is really powerfull
    Watch your back, your packetz will belong to me soon... xD

    BackTrack :
    Giving Machine Guns to Monkeys since 2006

  5. #5
    Developer
    Join Date
    Mar 2007
    Posts
    6,124

    Default

    The new metasploit frame work is coded in ruby so if you plan on using it to develop a exploit after you find a vunerability it would be usefull to be proficiant in ruby. Black foot is right fuzzing is the teqnique used for finding vunerabilities. Backtrack comes with some very useful fuzzers but even before that you must learn about the stack, and break points and the eip and a lot of other things. other wise you wont know a vunerability when you see it

  6. #6
    Junior Member
    Join Date
    May 2007
    Posts
    82

    Default

    Well thank you guys very much i mean tht, i shall looking into it now, i do know abit of ASM. I wanna learn this stuff to get good at it, i dont really like using metasploit cause i'd wanna learn how to find them exploit them not jus click, config, exploit (not my thing). Thanks people :-D

    Script kiddies = n00bs

  7. #7
    Junior Member imported_seven's Avatar
    Join Date
    May 2007
    Posts
    97

    Default

    I agree on writing your own exploit, as I am learning C and python to write mine, but don't consider metasploit to be completely noob. Tinker with metasploit to get a feel of how the exploit works, after exectuing an exploit and it's payload, you can look at the source code to view how it did it for an idea for your own exploit. Then further enhance it.

  8. #8
    Member imported_blackfoot's Avatar
    Join Date
    Jun 2007
    Posts
    386

    Default asm

    I had a quick look at ASM as I could not recall that the boys at Grenoble were doing anything of interest in this sector.

    ASM appears to manipulate Java classes in an adaptable environment. It presumes extensive write permissions. Whilst it does indeed adapt byte-code I do not see it as approaching anything in a useable form to run alongside nor to replace shellcoding.

    To use this (ASM) restricts your activity to java classes only and the likelihood of finding (in my opinion) the precise memory location of a class to adapt and maintain the memory footprint without prior knowledge of the model which one is adapting dynamically is at best difficult and certainly time-consuming.


    I accept that metasploit is dependent on ruby. I overlooked that important point.

    Best of luck in your quest! By all means write again if you wish any of us to expand points.
    Lux sit

  9. #9
    fenec
    Guest

    Default test

    i have tried a tuto ceonserning BOF and it desnt work, any idea ? maybe a buffer overflow protection in backtrack?

  10. #10
    Moderator KMDave's Avatar
    Join Date
    Jan 2010
    Posts
    2,281

    Default

    Read up on how overflows work and answer the question yourself.
    Tiocfaidh ár lá

Page 1 of 2 12 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •