Conclusion

We hope that we have covered enough ground to get you started developing exploits for the Tru64 architecture. Non-executable stack and 64-bit address registers definitely make things more challenging, but as we prove in this chapter, it is not at all difficult to come out with remote exploits even for non-typical architectures. We urge you not to believe such marketing slogans as secure by default or impossible to exploit . Once a pointer gets squashed, nothing is impossible or unbreakable .



The Shellcoder's Handbook. Discovering and Exploiting Security
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
ISBN: N/A
EAN: 2147483647
Year: 2003
Pages: 198
Authors: Neal Krawetz

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net