Very nice article! On Dec 31, 2007 10:07 AM, Ben <[EMAIL PROTECTED]> wrote:
> I just updated my blog with an analysis of a level on a wargame I was > playing (pulltheplug). It gives a technical overview (hopefully without > ruining the level) of a successfull attack on a PAX secured system (non-exec > stack) exploiting a stack buffer overflow on a statically linked multi > threaded binary... thought some of you may find it of interest, plus I'm > sure some of you how a much cleaner way of exploitation. I'd like to hear > your ideas/feedback. Its a quick dirty write up so parden grammer/spelling. > > > http://www.socialnetworkwhore.com/index.php?blog=5&title=exploring_vortex_level_12&more=1&c=1&tb=1&pb=1 > > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > -- http://search.goldwatches.com/?Search=Movado+Watches http://www.jewelerslounge.com http://www.goldwatches.com
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
