I just updated my blog with an analysis of a level on a wargame I was playing (pulltheplug). It gives a technical overview (hopefully without ruining the level) of a successfull attack on a PAX secured system (non-exec stack) exploiting a stack buffer overflow on a statically linked multi threaded binary... thought some of you may find it of interest, plus I'm sure some of you how a much cleaner way of exploitation. I'd like to hear your ideas/feedback. Its a quick dirty write up so parden grammer/spelling.
http://www.socialnetworkwhore.com/index.php?blog=5&title=exploring_vortex_level_12&more=1&c=1&tb=1&pb=1 _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
