Practicing buffer overflow attack in Ubuntu
Posted
by wakandan
on Stack Overflow
See other posts from Stack Overflow
or by wakandan
Published on 2009-07-02T02:56:49Z
Indexed on
2010/06/05
9:42 UTC
Read the original article
Hit count: 239
I am trying to learn to use buffer overflow attack in Ubuntu. Unfortunately, I cannot turn off Address Space Layout Randomization (ASLR) feature in this OS, which is turned on by default. I have tried some work around found in some fedora books:
echo "0" > /proc/sys/kernel/randomize_va_space
but for some reason the protection's still there. Please give me some suggestions. Thanks.
[edit]Actually the above command was not successful, it said "Permission Denied", even with sudo. How can I fix that?
[adding] I kept on getting segmetation fault error when it shows an address in stack. Is it related to non-executable stack in ubuntu :(?
© Stack Overflow or respective owner