Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 18 Oct 2004 09:38:57 +0300
From:      Giorgos Keramidas <keramida@ceid.upatras.gr>
To:        freebsd-questions@freebsd.org
Subject:   Re: No Buffer Overflow
Message-ID:  <20041018063857.GA827@gothmog.gr>
In-Reply-To: <20041017204152.4046638e@dolphin.local.net>
References:  <4172F3D2.8040200@uiowa.edu> <20041018000118.GB664@gothmog.gr> <20041017204152.4046638e@dolphin.local.net>

next in thread | previous in thread | raw e-mail | index | archive | help
On 2004-10-17 20:41, "Conrad J. Sabatier" <conrads@cox.net> wrote:
> On Mon, 18 Oct 2004 03:01:18 +0300, Giorgos Keramidas
> <keramida@ceid.upatras.gr> wrote:
> > On 2004-10-17 17:36, Jason Dusek <jason-dusek@uiowa.edu> wrote:
> > > I am reading an intro to shell-coding, and the following program is
> > > used as a simple example of vulnerable code: [...]
> > > When I run this code like this:
> > >   18 > vuln
> > >   Segmentation fault (core dumped)
> > > In the tutorial this line:
> > > 19 > vuln `perl -e 'print "A"x256 . "BBBB" . "CCCC"'`
>
> I'm glad you replied to the OP, because the way he was showing his
> attempts to run the program, it looked like he was invoking some
> programs called "18" and "19" and redirecting their stdout to "vuln".

I assumed this was the history-number of the current command because
their difference was only 1.  If the two numbers had a difference of
more than 1, I'd probably ask first.

> You must have already been familiar with the book or tutorial he was
> referring to.  :-)

Not really.  I was just guessing, since a lot of people use %! in their
tcsh prompt (or \! in bash).



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20041018063857.GA827>