Hy i got a sps in my hands with vx works 5.5. I played around with some simple Buffer overflows.
I got them to work pretty easy with some help of gdb remote debug and a simple c programs that uses strcpy.
the c code looks some thing like this:
My only problem was that you can't say where the stack of your application is going to be loaded becouse if you start another application before yours, your stack goes to another address you can solve this by over writing a huge memory space but the risk of overwriting more stacks is really high so the attack would be recognized pretty fast. :S
Has some one an idea how they managed that problem 20 years ago? ^^
PS: I ask only for technical interests.
I got them to work pretty easy with some help of gdb remote debug and a simple c programs that uses strcpy.
the c code looks some thing like this:
Code:
function broken_function(char *buffer) {
char tosmallbuffer[130];
strcpy(tosmallbuffer, buffer);
}
Has some one an idea how they managed that problem 20 years ago? ^^
PS: I ask only for technical interests.