Practicing buffer overflow attack in Ubuntu

Posted by wakandan on Stack Overflow See other posts from Stack Overflow or by wakandan
Published on 2009-07-02T02:56:49Z Indexed on 2010/06/05 9:42 UTC
Read the original article Hit count: 239

Filed under:
|
|

I am trying to learn to use buffer overflow attack in Ubuntu. Unfortunately, I cannot turn off Address Space Layout Randomization (ASLR) feature in this OS, which is turned on by default. I have tried some work around found in some fedora books:

echo "0" > /proc/sys/kernel/randomize_va_space

but for some reason the protection's still there. Please give me some suggestions. Thanks.

[edit]Actually the above command was not successful, it said "Permission Denied", even with sudo. How can I fix that?

[adding] I kept on getting segmetation fault error when it shows an address in stack. Is it related to non-executable stack in ubuntu :(?

© Stack Overflow or respective owner

Related posts about memory

Related posts about ubuntu