-3

I am attempting to launch a shell in my Linux environment (BT3) but it keeps seg faulting. The method that I'm using is out of The Shellcoder's HandBook. Note that all of this is straight out of the text.

For more reference: http://www.backtrack-linux.org/forums/old-pentesting/15508-stuck-eip-buffer-overflow.html

Ethan Heilman
  • 16,347
  • 11
  • 61
  • 88
bhavis
  • 13

2 Answers2

3

Many buffer overflow exploits have been fixed in modern operating system patches. It's likely you're seg faulting because the operating system is detecting a buffer overrun and killing your process.

Rich
  • 12,068
  • 9
  • 62
  • 94
1

If you're running on a modern kernel then your application is segfaulting because exploiting EIP is easily detectable by the OS. When EIP gets changed or overrun the OS has mechanisms in place to check whether the location EIP is pointing is valid in the virtual memory area. In the case of that exploit that check would fail and the OS would send a SIGKILL or SIGSEGV to your application to prevent any harm from being done.

Jesus Ramos
  • 22,940
  • 10
  • 58
  • 88
  • you can't disble it unless you find the relevant code in the operating system and remove it which is a bad idea – Jesus Ramos Jul 16 '11 at 04:19
  • i have disabled this but still not able to do it – bhavis Jul 17 '11 at 12:45
  • I doubt that you've disabled all the places where EIP overflows in the kernel are detected, this is also not the place to ask about how to exploit systems or certain things hence why your question was closed – Jesus Ramos Jul 17 '11 at 13:13