Hi,
On Sun, Jan 16, 2005 at 02:00:22PM -0500, Bill Pringlemeir wrote:
>
> [please CC me.]
>
> I was looking at phrack and many of the remote exploits rely on
> injecting some arbitrary code. Generally is is something like
> 'exec("/bin/sh")' or something like that.
>
> I was wondering if a sec
[please CC me.]
I was looking at phrack and many of the remote exploits rely on
injecting some arbitrary code. Generally is is something like
'exec("/bin/sh")' or something like that.
I was wondering if a section could be added to the link phase of a
user application that would keep a list/bit
2 matches
Mail list logo