>  I'm reading more papers about "how generate exploits", but where I can find
> good information about buffer overflow, smashing the stack, etc.

I just recently found a good example, which is actually going into the
details;

http://www.radsoft.net/security/mudge.html

You will find some more on this topic, browsing that well-worthy website.


- Jonas Nagel

-- 
Security <[EMAIL PROTECTED]>

Reply via email to