<div class="gmail_quote">On Tue, Aug 4, 2009 at 2:18 PM, Sai Emrys <span dir="ltr"><<a href="mailto:noisebridge@saizai.com">noisebridge@saizai.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">
I'd be interested in this, but would suggest aiming at local (and<br>
possibly remote?) exploits in general, rather than buffer overflows<br>
exclusively.</blockquote><div><br></div><div>I think you're a little confused ... Local/remote is just the method to get your exploit code there, not a class of vulnerability.</div><div><br></div><div>How you get your shellcode there can change but the theory is the same -- buffer overflow, NULL pointer deref, format string, etc. Start at the beginning and move your way. Jon's book takes this approach and it works great.</div>
<div><br></div>--<br>Kurt Grutzmacher -=- <a href="mailto:grutz@jingojango.net">grutz@jingojango.net</a></div>