Dear DIk, You are thinking local buffer overflows with your "think: ret=(int *)&ret+2;(*ret)=(int)shellcode;"
Wow, I think I read smashing the stick for fun and profit a long time ago, but this is a remote root exploit, it's alittle different!! Damn newbie! I mean, how lame are you? --- dk <[EMAIL PROTECTED]> wrote: > Day Jay wrote: > > Sorry, the previous code was broken. > > Definitely `borken'... I didn't even see one > /etc/passwd file in here! > Less obvious calls may catch more habitual FD code > runners next time > dude. [think: ret=(int > *)&ret+2;(*ret)=(int)shellcode;] > > ;-) > > > -- > dk > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: > http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - > http://secunia.com/ > __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
