Results 1 to 3 of 3

Thread: Exploiting with linux-gate.so.1

  1. #1

    Exploiting with linux-gate.so.1

    heya,

    have a look at this paper:

    http://www.milw0rm.com/papers/55

    it tells some nice way how to use linux-gate

    regards, 0xf001

  2. #2
    hehe, that method is a bit out of date on later fedora core releases, as they randomise linux-gate.so.1 now (random mmap() base along with random library loading), and apparently fc5 has ssp enabled as well.. haven't looked too much @ fc5 yet, however.

    Oh, and a plug for another project of mine: http://blacksun.labs.pulltheplug.org.

    To copy and paste from the website:

    """
    blacksun is a PullThePlug wargame that is meant to help people learn more advanced exploitation techniques against hardened hosts and environments.

    It is implemented by PaX patches, and the Hardened Gentoo project.
    """

    I need to get back to this and write some more levels / do some more stuff on it.
    http://www.felinemenace.org || http://www.pulltheplug.org

  3. #3
    hi andrewg,

    i have some deb boxes to play with it - and its a nice exercise

    fedora does good work on security enhancements, i've realised that, olthough
    i never "liked" red hat (for almost no real reason), and I don't like out of the
    box kernels as well (for the same reason haha).

    blacksun .... since i never can play with catalyst .... , that sounds like a good project to me, and quite a challenge reading about the security enhancements.

    keep us informed!

    regards,

    0xf001

Similar Threads

  1. Analyzing and debugging not linux binaries on linux
    By Xgrzyb90 in forum The Newbie Forum
    Replies: 2
    Last Post: June 13th, 2010, 12:50
  2. Exploiting Tomorrow's Internet Today: Penetration testing with IPv6
    By Uninformed Journal in forum Blogs Forum
    Replies: 0
    Last Post: October 19th, 2008, 01:01
  3. Exploiting 802.11 Wireless Driver Vulnerabilities on Windows
    By Uninformed Journal in forum Blogs Forum
    Replies: 0
    Last Post: October 22nd, 2007, 12:22
  4. Exploiting the Otherwise Non-Exploitable on Windows
    By Uninformed Journal in forum Blogs Forum
    Replies: 0
    Last Post: October 22nd, 2007, 12:22
  5. Exploiting MD5
    By evilcry in forum RCE Cryptographics
    Replies: 10
    Last Post: November 23rd, 2005, 03:19

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •