> Hi,
>
> first of all apologies for asking such a newbie question but I am trying
> to learn how to exploit buffer overflows and therefore wrote a little
> program to exploit. This little program has the following permissions:
>
> $ ls -la test1
> -rwsr-sr-x 1 root root 17164 Oct 8 01:25 test1
>
Werner Schalk wrote:
Now I exploited it using Aleph One's shellcode (see
http://shellcode.org/shellcode/linux/null-free/) but I won't get a SUID
shell afterwards (I know the exploit did work but I still have my normal
user privleges). Why? I have tried a different shellcode to write a file
a
try copying /bin/bash to /tmp/ directory, setting suid for all
t+
2005/10/9, Joachim Schipper <[EMAIL PROTECTED]>:
> On Sun, Oct 09, 2005 at 01:17:39AM +0200, Werner Schalk wrote:
> > Hi,
> >
> > first of all apologies for asking such a newbie question but I am trying
> > to learn how to exploit
On Sun, Oct 09, 2005 at 01:17:39AM +0200, Werner Schalk wrote:
> Hi,
>
> first of all apologies for asking such a newbie question but I am trying
> to learn how to exploit buffer overflows and therefore wrote a little
> program to exploit. This little program has the following permissions:
>
Hi,
first of all apologies for asking such a newbie question but I am trying
to learn how to exploit buffer overflows and therefore wrote a little
program to exploit. This little program has the following permissions:
$ ls -la test1
-rwsr-sr-x 1 root root 17164 Oct 8 01:25 test1
Now I