07-06-2011, 01:59 PM
Hello there...
iam trying to learn to use buffer overflow attack in Ubuntu. Unfortunately, I cannot turn off Address Space Layout Randomization (ASLR) feature in this OS, like it
but for some reason the protection's still there. Please give me some suggestions. Thanks.
Actually the above command was not successful, it said "Permission Denied", even with sudo. How can I fix that?
I kept on getting segmetation fault error when it shows an address in stack. Is it related to non-executable stack in backtrack
iam trying to learn to use buffer overflow attack in Ubuntu. Unfortunately, I cannot turn off Address Space Layout Randomization (ASLR) feature in this OS, like it
Code:
# echo "0" > /proc/sys/kernel/randomize_va_space
but for some reason the protection's still there. Please give me some suggestions. Thanks.
Actually the above command was not successful, it said "Permission Denied", even with sudo. How can I fix that?
I kept on getting segmetation fault error when it shows an address in stack. Is it related to non-executable stack in backtrack