Hi list,

  Now I'm doing some research on "smashing the stack" buffer overflows.
http://www.insecure.org/stf/mudge_buffer_overflow_tutorial.html 
is an old example of this.  

  But, the example given does not segfault on my system when I compile
it,  I guess its reading pass the char array into null terminated
padded memory or something, which is legal.

Can anyone get this thing to segfault "as is" with their system?

just,

gcc -o test test.c

./test

Attached is the test.

Thanks,



=====
Ted Katseres
----------------
------------------------
--------------------------------

__________________________________
Do you Yahoo!?
Yahoo! Mail SpamGuard - Read only the mail you want.
http://antispam.yahoo.com/tools

Attachment: test.c
Description: test.c

Reply via email to