As part of the course assignment, I need to write an exploit code to cause a buffer overflow and execute code that is present on the stack.
I disabled stack randomization with the following command: sysctl -w kernel.randomize_va_space = 0 However, I cannot find a way to disable stack execution protection. I'm not sure if there is any exec exec protection in ubuntu or not ... so my first question is: is there something like red-exec exec-shield in ubuntu 8.10, and if there is, how can we disable it .
I try to cause a buffer overflow and execute an instruction from the stack, but whenever I try to do this, it gives me a seg error.
I have ubuntu 8.10 64 bit, HOWEVER, debugging the im program compiled on an i386 machine with stack protection disabled.
source
share