lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue Oct 11 14:49:26 2005
From: justliketocode at yahoo.com (none none)
Subject: 
	http://prdelka.blackart.org.uk/paperz/VAstacksmash.txt

Can you point out where in the kernel tree this
randomization has been done? I havent seen anything on
LKML explaining this.

>Linux kernel recently incorporated a protection which
>randomizes the stack making exploitation of
>stack based overflows more difficult. I present here
>an attack which works on exploiting static
>addresses in Linux. You should be familiar with
>standard stack smashing before attempting this 
>paper.

>Thank you.


	
		
__________________________________ 
Yahoo! Mail - PC Magazine Editors' Choice 2005 
http://mail.yahoo.com

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ