Date: Mon, 18 Oct 2004 09:38:57 +0300 From: Giorgos Keramidas <keramida@ceid.upatras.gr> To: freebsd-questions@freebsd.org Subject: Re: No Buffer Overflow Message-ID: <20041018063857.GA827@gothmog.gr> In-Reply-To: <20041017204152.4046638e@dolphin.local.net> References: <4172F3D2.8040200@uiowa.edu> <20041018000118.GB664@gothmog.gr> <20041017204152.4046638e@dolphin.local.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On 2004-10-17 20:41, "Conrad J. Sabatier" <conrads@cox.net> wrote: > On Mon, 18 Oct 2004 03:01:18 +0300, Giorgos Keramidas > <keramida@ceid.upatras.gr> wrote: > > On 2004-10-17 17:36, Jason Dusek <jason-dusek@uiowa.edu> wrote: > > > I am reading an intro to shell-coding, and the following program is > > > used as a simple example of vulnerable code: [...] > > > When I run this code like this: > > > 18 > vuln > > > Segmentation fault (core dumped) > > > In the tutorial this line: > > > 19 > vuln `perl -e 'print "A"x256 . "BBBB" . "CCCC"'` > > I'm glad you replied to the OP, because the way he was showing his > attempts to run the program, it looked like he was invoking some > programs called "18" and "19" and redirecting their stdout to "vuln". I assumed this was the history-number of the current command because their difference was only 1. If the two numbers had a difference of more than 1, I'd probably ask first. > You must have already been familiar with the book or tutorial he was > referring to. :-) Not really. I was just guessing, since a lot of people use %! in their tcsh prompt (or \! in bash).
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20041018063857.GA827>