return to libc- finding libc’s address and finding offsets

So I tried performing a return-to-libc according to https://sploitfun.wordpress.com/2015/05/08/bypassing-nx-bit-using-return-to-libc/ .

I found libc’s address by using “ldd vuln”, and found system’s offset by using “readelf -s /lib/i386-l… Continue reading return to libc- finding libc’s address and finding offsets

The New Glibc Getaddrinfo Vulnerability: Is It GHOST 2.0?

Is the new glibc getaddrinfo vulnerability really GHOST 2.0? Signs point to yes, so organizations should patch this vulnerability immediately.

The post The New Glibc Getaddrinfo Vulnerability: Is It GHOST 2.0? appeared first on Security Intelligence.

Continue reading The New Glibc Getaddrinfo Vulnerability: Is It GHOST 2.0?

The Linux glibc Exploit – What You Need To Know

So the Internet exploded this week with news of a pretty serious glibc exploit, something that everyone pays attention to as every Linux server uses this library and in some cases it can yield remote code execution. In basic terms the glibc DNS client (libresolv) is vulnerable to a stack-based buffer overflow when the getaddrinfo() […]

The…

Read the full post at darknet.org.uk

Continue reading The Linux glibc Exploit – What You Need To Know