Www Thegeekstuff Com 2013 02 Stack Smashing Attacks Gcc Utm

Embed Size (px)

Citation preview

  • 7/29/2019 Www Thegeekstuff Com 2013 02 Stack Smashing Attacks Gcc Utm

    1/7

    pdfcrowd comopen in browser PRO version Are you a developer? Try out the HTML to PDF API

    7 Like 5

    How to Avoid Stack Smashing Attacks with GCCbyHIMANSHU ARORA on FEBRUARY 7, 2013

    Tweet 1

    Stack smashing is a fancy term used for stack buffer overflows. It refers to attacks that exploit

    bugs in code enabling buffer overflows. Earlier it was solely the responsibility of

    programmers/developers to make sure that there is no possibility of a buffer overflow in their

    code but with time compilers like gcc have got flags to make sure that buffer overflow problems

    are not exploited by crackers to damage a system or a program.

    I came to know about these flags when I was trying to reproduce a buffer overflow on my

    Ubuntu 12.04 with gcc 4.6.3 version. Here is what I was trying to do :

    #include

    #include

    int main(void)

    {

    int len = 0;

    char str[10] = {0};

    Sign up for our free email newsletter

    [email protected] Sign Up

    RSS Twitter Facebook

    Search

    Install Google Chrome

    www.google.com/chrome

    A free browser that lets you do more of what you like online!

    Ads by Google Geek Unix Basic Unix Commands Print in Unix

    Home A bout Free eBook A rch ives Bes t o f t he B lo g Contac t

    http://pdfcrowd.com/redirect/?url=http%3a%2f%2fwww.thegeekstuff.com%2f2013%2f02%2fstack-smashing-attacks-gcc%2f%3futm_source%3dfeedburner%26utm_medium%3demail%26utm_campaign%3dFee&id=ma-130208010252-bfa24504http://pdfcrowd.com/redirect/?url=http%3a%2f%2fwww.thegeekstuff.com%2f2013%2f02%2fstack-smashing-attacks-gcc%2f%3futm_source%3dfeedburner%26utm_medium%3demail%26utm_campaign%3dFee&id=ma-130208010252-bfa24504http://pdfcrowd.com/redirect/?url=http%3a%2f%2fwww.thegeekstuff.com%2f2013%2f02%2fstack-smashing-attacks-gcc%2f%3futm_source%3dfeedburner%26utm_medium%3demail%26utm_campaign%3dFee&id=ma-130208010252-bfa24504http://pdfcrowd.com/redirect/?url=http%3a%2f%2fwww.thegeekstuff.com%2f2013%2f02%2fstack-smashing-attacks-gcc%2f%3futm_source%3dfeedburner%26utm_medium%3demail%26utm_campaign%3dFee&id=ma-130208010252-bfa24504http://pdfcrowd.com/redirect/?url=http%3a%2f%2fwww.thegeekstuff.com%2f2013%2f02%2fstack-smashing-attacks-gcc%2f%3futm_source%3dfeedburner%26utm_medium%3demail%26utm_campaign%3dFee&id=ma-130208010252-bfa24504https://www.google.com/adsense/support/bin/request.py?contact=abg_afc&url=http://www.thegeekstuff.com/2013/02/stack-smashing-attacks-gcc/%3Futm_source%3Dfeedburner%26utm_medium%3Demail%26utm_campaign%3DFee&hl=en&client=ca-pub-8090601437064582&rad0=Geek&rad1=Unix&rad2=Basic+Unix+Commands&rad3=Print+in+Unixhttp://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8090601437064582&output=html&h=15&slotname=0094642447&w=728&lmt=0&flash=0&url=http%3A%2F%2Fwww.thegeekstuff.com%2F2013%2F02%2Fstack-smashing-attacks-gcc%2F%3Futm_source%3Dfeedburner%26utm_medium%3Demail%26utm_campaign%3DFee&dt=1360303368333&bpp=2&shv=r20130204&jsv=r20121214&prev_slotnames=4708993701&correlator=1360303368549&frm=20&adk=1617453998&ga_vid=1418570282.1360303369&ga_sid=1360303369&ga_hid=2079434372&ga_fc=0&u_tz=-300&u_his=1&u_java=0&u_h=1024&u_w=1280&u_ah=0&u_aw=0&u_cd=24&u_nplug=0&u_nmime=0&dff=helvetica%20neue&dfs=10&adx=6&ady=181&biw=813&bih=568&oid=3&fu=0&ifi=2&dtd=443&xpc=Xo2nKkxah5&p=http%3A//www.thegeekstuff.com&rl_rc=true&adsense_enabled=true&ad_type=text_image&oe=utf8&height=15&width=728&format=fp_al_lp&fs=medium&f=verdana&kw_type=radlink&prev_fmts=728x15_0ads_al&rt=ChBRFJUJAAGengo0KOfIAFlfEgRHZWVrGgjpqF0kswSZVigBUhMIlare-ISmtQIV5Sw0Ch2AdADz&hl=en&kw0=Geek&kw1=Unix&kw2=Basic+Unix+Commands&kw3=Print+in+Unix&okw=Geekhttp://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8090601437064582&output=html&h=15&slotname=0094642447&w=728&lmt=0&flash=0&url=http%3A%2F%2Fwww.thegeekstuff.com%2F2013%2F02%2Fstack-smashing-attacks-gcc%2F%3Futm_source%3Dfeedburner%26utm_medium%3Demail%26utm_campaign%3DFee&dt=1360303368333&bpp=2&shv=r20130204&jsv=r20121214&prev_slotnames=4708993701&correlator=1360303368549&frm=20&adk=1617453998&ga_vid=1418570282.1360303369&ga_sid=1360303369&ga_hid=2079434372&ga_fc=0&u_tz=-300&u_his=1&u_java=0&u_h=1024&u_w=1280&u_ah=0&u_aw=0&u_cd=24&u_nplug=0&u_nmime=0&dff=helvetica%20neue&dfs=10&adx=6&ady=181&biw=813&bih=568&oid=3&fu=0&ifi=2&dtd=443&xpc=Xo2nKkxah5&p=http%3A//www.thegeekstuff.com&rl_rc=true&adsense_enabled=true&ad_type=text_image&oe=utf8&height=15&width=728&format=fp_al_lp&fs=medium&f=verdana&kw_type=radlink&prev_fmts=728x15_0ads_al&rt=ChBRFJUJAAGergo0KOfIAFlfEgRVbml4Ggj8Q6YwORPHDSgBUhMIlare-ISmtQIV5Sw0Ch2AdADz&hl=en&kw0=Geek&kw1=Unix&kw2=Basic+Unix+Commands&kw3=Print+in+Unix&okw=Unixhttp://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8090601437064582&output=html&h=15&slotname=0094642447&w=728&lmt=0&flash=0&url=http%3A%2F%2Fwww.thegeekstuff.com%2F2013%2F02%2Fstack-smashing-attacks-gcc%2F%3Futm_source%3Dfeedburner%26utm_medium%3Demail%26utm_campaign%3DFee&dt=1360303368333&bpp=2&shv=r20130204&jsv=r20121214&prev_slotnames=4708993701&correlator=1360303368549&frm=20&adk=1617453998&ga_vid=1418570282.1360303369&ga_sid=1360303369&ga_hid=2079434372&ga_fc=0&u_tz=-300&u_his=1&u_java=0&u_h=1024&u_w=1280&u_ah=0&u_aw=0&u_cd=24&u_nplug=0&u_nmime=0&dff=helvetica%20neue&dfs=10&adx=6&ady=181&biw=813&bih=568&oid=3&fu=0&ifi=2&dtd=443&xpc=Xo2nKkxah5&p=http%3A//www.thegeekstuff.com&rl_rc=true&adsense_enabled=true&ad_type=text_image&oe=utf8&height=15&width=728&format=fp_al_lp&fs=medium&f=verdana&kw_type=radlink&prev_fmts=728x15_0ads_al&rt=ChBRFJUJAAGesQo0KOfIAFlfEhNCYXNpYyBVbml4IENvbW1hbmRzGghXv9LY7aTQECgBUhMIlare-ISmtQIV5Sw0Ch2AdADz&hl=en&kw0=Geek&kw1=Unix&kw2=Basic+Unix+Commands&kw3=Print+in+Unix&okw=Basic+Unix+Commandshttp://www.thegeekstuff.com/http://www.thegeekstuff.com/http://www.thegeekstuff.com/http://googleads.g.doubleclick.net/aclk?sa=l&ai=CSpmfCZUUUe3sBePT0AHnyoB4yIOq5QLghaHzPL_hHhABIKKB1wtQ3cO2lwJgyY78irSk2A-gAfSagvkDyAECqAMByAPdBKoEzgFP0Mvy9OBKeBHRQOzIydt55O_I5kXN9ZE2Pj16N1hJkT-G7Q91sDaw0B975p4PnCk4pvqIu0KWev3qxCbXQWz2wf85vwX1gEJ3Kj8NRcPRG4bqH2Nw_O56rkinnFtrXhrAOKjdqDq-aiVmCo1Canujx9E9USIQxTCdEFETbMtTUy0urdoJkCGXecV1ltviwAMI7Mr-gzjjr8RDviUohxnaUNKN6YAOew1oYHVVSYSdaRDnTeRd7tDahWTKBcvTc9AgOtxof5oD6B8lrdogX6AGAoAH9OT9Bg&num=1&sig=AOD64_3Kpqfig1G2pEyFpoGXuaOtne-flA&client=ca-pub-8090601437064582&adurl=http://www.comparecards.com/category/low-interest%3Fk%3D555-3%26aw_cam%3DDisplay_Campaign_Optimizer%26aw_adg%3DDCO%26aw_med%3Dcontent%26aw_pla%3Dwww.thegeekstuff.com%26aw_cre%3D16268288688%26aw_tar%3Dundetermined%26aw_key%3Dhttp://pdfcrowd.com/redirect/?url=http%3a%2f%2fwww.thegeekstuff.com%2f2013%2f02%2fstack-smashing-attacks-gcc%2f%3futm_source%3dfeedburner%26utm_medium%3demail%26utm_campaign%3dFee&id=ma-130208010252-bfa24504http://pdfcrowd.com/customize/http://pdfcrowd.com/customize/http://pdfcrowd.com/html-to-pdf-api/?ref=pdfhttp://pdfcrowd.com/html-to-pdf-api/?ref=pdfhttp://googleads.g.doubleclick.net/aclk?sa=l&ai=CSpmfCZUUUe3sBePT0AHnyoB4yIOq5QLghaHzPL_hHhABIKKB1wtQ3cO2lwJgyY78irSk2A-gAfSagvkDyAECqAMByAPdBKoEzgFP0Mvy9OBKeBHRQOzIydt55O_I5kXN9ZE2Pj16N1hJkT-G7Q91sDaw0B975p4PnCk4pvqIu0KWev3qxCbXQWz2wf85vwX1gEJ3Kj8NRcPRG4bqH2Nw_O56rkinnFtrXhrAOKjdqDq-aiVmCo1Canujx9E9USIQxTCdEFETbMtTUy0urdoJkCGXecV1ltviwAMI7Mr-gzjjr8RDviUohxnaUNKN6YAOew1oYHVVSYSdaRDnTeRd7tDahWTKBcvTc9AgOtxof5oD6B8lrdogX6AGAoAH9OT9Bg&num=1&sig=AOD64_3Kpqfig1G2pEyFpoGXuaOtne-flA&client=ca-pub-8090601437064582&adurl=http://www.comparecards.com/category/low-interest%3Fk%3D555-3%26aw_cam%3DDisplay_Campaign_Optimizer%26aw_adg%3DDCO%26aw_med%3Dcontent%26aw_pla%3Dwww.thegeekstuff.com%26aw_cre%3D16268288688%26aw_tar%3Dundetermined%26aw_key%3Dhttp://googleads.g.doubleclick.net/aclk?sa=l&ai=CSpmfCZUUUe3sBePT0AHnyoB4yIOq5QLghaHzPL_hHhABIKKB1wtQ3cO2lwJgyY78irSk2A-gAfSagvkDyAECqAMByAPdBKoEzgFP0Mvy9OBKeBHRQOzIydt55O_I5kXN9ZE2Pj16N1hJkT-G7Q91sDaw0B975p4PnCk4pvqIu0KWev3qxCbXQWz2wf85vwX1gEJ3Kj8NRcPRG4bqH2Nw_O56rkinnFtrXhrAOKjdqDq-aiVmCo1Canujx9E9USIQxTCdEFETbMtTUy0urdoJkCGXecV1ltviwAMI7Mr-gzjjr8RDviUohxnaUNKN6YAOew1oYHVVSYSdaRDnTeRd7tDahWTKBcvTc9AgOtxof5oD6B8lrdogX6AGAoAH9OT9Bg&num=1&sig=AOD64_3Kpqfig1G2pEyFpoGXuaOtne-flA&client=ca-pub-8090601437064582&adurl=http://www.comparecards.com/category/low-interest%3Fk%3D555-3%26aw_cam%3DDisplay_Campaign_Optimizer%26aw_adg%3DDCO%26aw_med%3Dcontent%26aw_pla%3Dwww.thegeekstuff.com%26aw_cre%3D16268288688%26aw_tar%3Dundetermined%26aw_key%3Dhttp://googleads.g.doubleclick.net/aclk?sa=l&ai=CSpmfCZUUUe3sBePT0AHnyoB4yIOq5QLghaHzPL_hHhABIKKB1wtQ3cO2lwJgyY78irSk2A-gAfSagvkDyAECqAMByAPdBKoEzgFP0Mvy9OBKeBHRQOzIydt55O_I5kXN9ZE2Pj16N1hJkT-G7Q91sDaw0B975p4PnCk4pvqIu0KWev3qxCbXQWz2wf85vwX1gEJ3Kj8NRcPRG4bqH2Nw_O56rkinnFtrXhrAOKjdqDq-aiVmCo1Canujx9E9USIQxTCdEFETbMtTUy0urdoJkCGXecV1ltviwAMI7Mr-gzjjr8RDviUohxnaUNKN6YAOew1oYHVVSYSdaRDnTeRd7tDahWTKBcvTc9AgOtxof5oD6B8lrdogX6AGAoAH9OT9Bg&num=1&sig=AOD64_3Kpqfig1G2pEyFpoGXuaOtne-flA&client=ca-pub-8090601437064582&adurl=http://www.comparecards.com/category/low-interest%3Fk%3D555-3%26aw_cam%3DDisplay_Campaign_Optimizer%26aw_adg%3DDCO%26aw_med%3Dcontent%26aw_pla%3Dwww.thegeekstuff.com%26aw_cre%3D16268288688%26aw_tar%3Dundetermined%26aw_key%3Dhttp://googleads.g.doubleclick.net/aclk?sa=l&ai=CSpmfCZUUUe3sBePT0AHnyoB4yIOq5QLghaHzPL_hHhABIKKB1wtQ3cO2lwJgyY78irSk2A-gAfSagvkDyAECqAMByAPdBKoEzgFP0Mvy9OBKeBHRQOzIydt55O_I5kXN9ZE2Pj16N1hJkT-G7Q91sDaw0B975p4PnCk4pvqIu0KWev3qxCbXQWz2wf85vwX1gEJ3Kj8NRcPRG4bqH2Nw_O56rkinnFtrXhrAOKjdqDq-aiVmCo1Canujx9E9USIQxTCdEFETbMtTUy0urdoJkCGXecV1ltviwAMI7Mr-gzjjr8RDviUohxnaUNKN6YAOew1oYHVVSYSdaRDnTeRd7tDahWTKBcvTc9AgOtxof5oD6B8lrdogX6AGAoAH9OT9Bg&num=1&sig=AOD64_3Kpqfig1G2pEyFpoGXuaOtne-flA&client=ca-pub-8090601437064582&adurl=http://www.comparecards.com/category/low-interest%3Fk%3D555-3%26aw_cam%3DDisplay_Campaign_Optimizer%26aw_adg%3DDCO%26aw_med%3Dcontent%26aw_pla%3Dwww.thegeekstuff.com%26aw_cre%3D16268288688%26aw_tar%3Dundetermined%26aw_key%3Dhttp://pdfcrowd.com/http://pdfcrowd.com/redirect/?url=http%3a%2f%2fwww.thegeekstuff.com%2f2013%2f02%2fstack-smashing-attacks-gcc%2f%3futm_source%3dfeedburner%26utm_medium%3demail%26utm_campaign%3dFee&id=ma-130208010252-bfa24504http://pdfcrowd.com/customize/http://pdfcrowd.com/html-to-pdf-api/?ref=pdfhttp://www.thegeekstuff.com/https://twitter.com/intent/tweet?original_referer=http%3A%2F%2Fwww.thegeekstuff.com%2F2013%2F02%2Fstack-smashing-attacks-gcc%2F%3Futm_source%3Dfeedburner%26utm_medium%3Demail%26utm_campaign%3DFee&text=How%20to%20Avoid%20Stack%20Smashing%20Attacks%20with%20GCC&tw_p=tweetbutton&url=http%3A%2F%2Fwww.thegeekstuff.com%2F2013%2F02%2Fstack-smashing-attacks-gcc%2Fhttp://twitter.com/search?q=http%3A%2F%2Fwww.thegeekstuff.com%2F2013%2F02%2Fstack-smashing-attacks-gcc%2Fhttp://www.thegeekstuff.com/feedhttp://www.thegeekstuff.com/feedhttp://twitter.com/thegeekstuffhttp://www.facebook.com/thegeekstuffhttp://googleads.g.doubleclick.net/aclk?sa=l&ai=C_bFhCJUUUY6QL4re0AGwn4HQDPvu9f4Ew5XLx0u7vs3ooQEQASCigdcLULuBkc39_____wFgyY78irSk2A-gAZXon9QDyAEBqAMByAPfBKoExAFP0Kha0HZp_UuDS9y8yZTqkuNAmLgZfVKSgVVzDmBuGr1_4Rx9Y_dTezcVtaHh5yupObTf_P2n3bGxMrmpaM9a_qyRXaxz-6NyqLtyqsMpfuvq4LNuw5zmrPne5NhAexPaNeUla3gTvnC1g_G2cOkU6IYWhlZGVT8tcoUy2Gd59VGvSo6WCHB8bH5coIkMkdAHHADyQTnmrxIAZV-ZwjYfInIP5KnYlZbBNIcFLhRK_5xvwP-N33gNmYAGctWMcDLoF83QgAfTl-Ar&num=1&sig=AOD64_2g1E-uhx9kYYdg3cSNvv40_Cwhug&client=ca-pub-8090601437064582&adurl=http://ad.doubleclick.net/clk%3B254126004%3B77916514%3Bdhttp://www.google.com/url?ct=abg&q=https://www.google.com/adsense/support/bin/request.py%3Fcontact%3Dabg_afc%26url%3Dhttp://www.thegeekstuff.com/2013/02/stack-smashing-attacks-gcc/%253Futm_source%253Dfeedburner%2526utm_medium%253Demail%2526utm_campaign%253DFee%26gl%3DUS%26hl%3Den%26client%3Dca-pub-8090601437064582%26ai0%3DC_bFhCJUUUY6QL4re0AGwn4HQDPvu9f4Ew5XLx0u7vs3ooQEQASCigdcLULuBkc39_____wFgyY78irSk2A-gAZXon9QDyAEBqAMByAPfBKoExAFP0Kha0HZp_UuDS9y8yZTqkuNAmLgZfVKSgVVzDmBuGr1_4Rx9Y_dTezcVtaHh5yupObTf_P2n3bGxMrmpaM9a_qyRXaxz-6NyqLtyqsMpfuvq4LNuw5zmrPne5NhAexPaNeUla3gTvnC1g_G2cOkU6IYWhlZGVT8tcoUy2Gd59VGvSo6WCHB8bH5coIkMkdAHHADyQTnmrxIAZV-ZwjYfInIP5KnYlZbBNIcFLhRK_5xvwP-N33gNmYAGctWMcDLoF83QgAfTl-Ar&usg=AFQjCNG67o2Bv0DNuNuKpg4YNqRGO2Ja1ghttps://www.google.com/adsense/support/bin/request.py?contact=abg_afc&url=http://www.thegeekstuff.com/2013/02/stack-smashing-attacks-gcc/%3Futm_source%3Dfeedburner%26utm_medium%3Demail%26utm_campaign%3DFee&hl=en&client=ca-pub-8090601437064582&rad0=Geek&rad1=Unix&rad2=Basic+Unix+Commands&rad3=Print+in+Unixhttp://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8090601437064582&output=html&h=15&slotname=0094642447&w=728&lmt=0&flash=0&url=http%3A%2F%2Fwww.thegeekstuff.com%2F2013%2F02%2Fstack-smashing-attacks-gcc%2F%3Futm_source%3Dfeedburner%26utm_medium%3Demail%26utm_campaign%3DFee&dt=1360303368333&bpp=2&shv=r20130204&jsv=r20121214&prev_slotnames=4708993701&correlator=1360303368549&frm=20&adk=1617453998&ga_vid=1418570282.1360303369&ga_sid=1360303369&ga_hid=2079434372&ga_fc=0&u_tz=-300&u_his=1&u_java=0&u_h=1024&u_w=1280&u_ah=0&u_aw=0&u_cd=24&u_nplug=0&u_nmime=0&dff=helvetica%20neue&dfs=10&adx=6&ady=181&biw=813&bih=568&oid=3&fu=0&ifi=2&dtd=443&xpc=Xo2nKkxah5&p=http%3A//www.thegeekstuff.com&rl_rc=true&adsense_enabled=true&ad_type=text_image&oe=utf8&height=15&width=728&format=fp_al_lp&fs=medium&f=verdana&kw_type=radlink&prev_fmts=728x15_0ads_al&rt=ChBRFJUJAAGengo0KOfIAFlfEgRHZWVrGgjpqF0kswSZVigBUhMIlare-ISmtQIV5Sw0Ch2AdADz&hl=en&kw0=Geek&kw1=Unix&kw2=Basic+Unix+Commands&kw3=Print+in+Unix&okw=Geekhttp://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8090601437064582&output=html&h=15&slotname=0094642447&w=728&lmt=0&flash=0&url=http%3A%2F%2Fwww.thegeekstuff.com%2F2013%2F02%2Fstack-smashing-attacks-gcc%2F%3Futm_source%3Dfeedburner%26utm_medium%3Demail%26utm_campaign%3DFee&dt=1360303368333&bpp=2&shv=r20130204&jsv=r20121214&prev_slotnames=4708993701&correlator=1360303368549&frm=20&adk=1617453998&ga_vid=1418570282.1360303369&ga_sid=1360303369&ga_hid=2079434372&ga_fc=0&u_tz=-300&u_his=1&u_java=0&u_h=1024&u_w=1280&u_ah=0&u_aw=0&u_cd=24&u_nplug=0&u_nmime=0&dff=helvetica%20neue&dfs=10&adx=6&ady=181&biw=813&bih=568&oid=3&fu=0&ifi=2&dtd=443&xpc=Xo2nKkxah5&p=http%3A//www.thegeekstuff.com&rl_rc=true&adsense_enabled=true&ad_type=text_image&oe=utf8&height=15&width=728&format=fp_al_lp&fs=medium&f=verdana&kw_type=radlink&prev_fmts=728x15_0ads_al&rt=ChBRFJUJAAGergo0KOfIAFlfEgRVbml4Ggj8Q6YwORPHDSgBUhMIlare-ISmtQIV5Sw0Ch2AdADz&hl=en&kw0=Geek&kw1=Unix&kw2=Basic+Unix+Commands&kw3=Print+in+Unix&okw=Unixhttp://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8090601437064582&output=html&h=15&slotname=0094642447&w=728&lmt=0&flash=0&url=http%3A%2F%2Fwww.thegeekstuff.com%2F2013%2F02%2Fstack-smashing-attacks-gcc%2F%3Futm_source%3Dfeedburner%26utm_medium%3Demail%26utm_campaign%3DFee&dt=1360303368333&bpp=2&shv=r20130204&jsv=r20121214&prev_slotnames=4708993701&correlator=1360303368549&frm=20&adk=1617453998&ga_vid=1418570282.1360303369&ga_sid=1360303369&ga_hid=2079434372&ga_fc=0&u_tz=-300&u_his=1&u_java=0&u_h=1024&u_w=1280&u_ah=0&u_aw=0&u_cd=24&u_nplug=0&u_nmime=0&dff=helvetica%20neue&dfs=10&adx=6&ady=181&biw=813&bih=568&oid=3&fu=0&ifi=2&dtd=443&xpc=Xo2nKkxah5&p=http%3A//www.thegeekstuff.com&rl_rc=true&adsense_enabled=true&ad_type=text_image&oe=utf8&height=15&width=728&format=fp_al_lp&fs=medium&f=verdana&kw_type=radlink&prev_fmts=728x15_0ads_al&rt=ChBRFJUJAAGesQo0KOfIAFlfEhNCYXNpYyBVbml4IENvbW1hbmRzGghXv9LY7aTQECgBUhMIlare-ISmtQIV5Sw0Ch2AdADz&hl=en&kw0=Geek&kw1=Unix&kw2=Basic+Unix+Commands&kw3=Print+in+Unix&okw=Basic+Unix+Commandshttp://googleads.g.doubleclick.net/pagead/ads?client=ca-pub-8090601437064582&output=html&h=15&slotname=0094642447&w=728&lmt=0&flash=0&url=http%3A%2F%2Fwww.thegeekstuff.com%2F2013%2F02%2Fstack-smashing-attacks-gcc%2F%3Futm_source%3Dfeedburner%26utm_medium%3Demail%26utm_campaign%3DFee&dt=1360303368333&bpp=2&shv=r20130204&jsv=r20121214&prev_slotnames=4708993701&correlator=1360303368549&frm=20&adk=1617453998&ga_vid=1418570282.1360303369&ga_sid=1360303369&ga_hid=2079434372&ga_fc=0&u_tz=-300&u_his=1&u_java=0&u_h=1024&u_w=1280&u_ah=0&u_aw=0&u_cd=24&u_nplug=0&u_nmime=0&dff=helvetica%20neue&dfs=10&adx=6&ady=181&biw=813&bih=568&oid=3&fu=0&ifi=2&dtd=443&xpc=Xo2nKkxah5&p=http%3A//www.thegeekstuff.com&rl_rc=true&adsense_enabled=true&ad_type=text_image&oe=utf8&height=15&width=728&format=fp_al_lp&fs=medium&f=verdana&kw_type=radlink&prev_fmts=728x15_0ads_al&rt=ChBRFJUJAAGeswo0KOfIAFlfEg1QcmludCBpbiBVbml4GgimIISXr3ubpigBUhMIlare-ISmtQIV5Sw0Ch2AdADz&hl=en&kw0=Geek&kw1=Unix&kw2=Basic+Unix+Commands&kw3=Print+in+Unix&okw=Print+in+Unixhttp://googleads.g.doubleclick.net/aclk?sa=l&ai=CSpmfCZUUUe3sBePT0AHnyoB4yIOq5QLghaHzPL_hHhABIKKB1wtQ3cO2lwJgyY78irSk2A-gAfSagvkDyAECqAMByAPdBKoEzgFP0Mvy9OBKeBHRQOzIydt55O_I5kXN9ZE2Pj16N1hJkT-G7Q91sDaw0B975p4PnCk4pvqIu0KWev3qxCbXQWz2wf85vwX1gEJ3Kj8NRcPRG4bqH2Nw_O56rkinnFtrXhrAOKjdqDq-aiVmCo1Canujx9E9USIQxTCdEFETbMtTUy0urdoJkCGXecV1ltviwAMI7Mr-gzjjr8RDviUohxnaUNKN6YAOew1oYHVVSYSdaRDnTeRd7tDahWTKBcvTc9AgOtxof5oD6B8lrdogX6AGAoAH9OT9Bg&num=1&sig=AOD64_3Kpqfig1G2pEyFpoGXuaOtne-flA&client=ca-pub-8090601437064582&adurl=http://www.comparecards.com/category/low-interest%3Fk%3D555-3%26aw_cam%3DDisplay_Campaign_Optimizer%26aw_adg%3DDCO%26aw_med%3Dcontent%26aw_pla%3Dwww.thegeekstuff.com%26aw_cre%3D16268288688%26aw_tar%3Dundetermined%26aw_key%3Dhttp://www.thegeekstuff.com/http://www.thegeekstuff.com/about/http://www.thegeekstuff.com/linux-101-hacks-ebook/http://www.thegeekstuff.com/archives-2/http://www.thegeekstuff.com/best-of-the-blog/http://www.thegeekstuff.com/contact/
  • 7/29/2019 Www Thegeekstuff Com 2013 02 Stack Smashing Attacks Gcc Utm

    2/7

    pdfcrowd comopen in browser PRO version Are you a developer? Try out the HTML to PDF API

    printf("\n Enter the name \n");

    gets(str); // Used gets() to cause buffer overflow

    printf("\n len = [%d] \n", len);

    len = strlen(str);

    printf("\n len of string entered is : [%d]\n", len);

    return 0;

    }

    In the code above, I have used gets() to accept a string from user. and then calculated the

    length of this string and printed back on stdout. The idea here is to input a string whose length

    is more than 10 bytes. Since gets() does not check array bounds so it will try to copy the input

    in the str buffer and this way buffer overflow will take place.

    This is what happened when I executed the program:

    $ ./stacksmash

    Enter the name

    TheGeekStuff

    len = [0]

    len of string entered is : [12]

    *** stack smashing detected ***: ./stacksmash terminated

    ======= Backtrace: =========

    /lib/i386-linux-gnu/libc.so.6(__fortify_fail+0x45)[0xb76e4045]

    /lib/i386-linux-gnu/libc.so.6(+0x103ffa)[0xb76e3ffa]

    ./stacksmash[0x8048548]

    /lib/i386-linux-gnu/libc.so.6(__libc_start_main+0xf3)[0xb75f94d3]

    ./stacksmash[0x8048401]

    ======= Memory map: ========

    EBOOKS

    http://googleads.g.doubleclick.net/aclk?sa=l&ai=CSpmfCZUUUe3sBePT0AHnyoB4yIOq5QLghaHzPL_hHhABIKKB1wtQ3cO2lwJgyY78irSk2A-gAfSagvkDyAECqAMByAPdBKoEzgFP0Mvy9OBKeBHRQOzIydt55O_I5kXN9ZE2Pj16N1hJkT-G7Q91sDaw0B975p4PnCk4pvqIu0KWev3qxCbXQWz2wf85vwX1gEJ3Kj8NRcPRG4bqH2Nw_O56rkinnFtrXhrAOKjdqDq-aiVmCo1Canujx9E9USIQxTCdEFETbMtTUy0urdoJkCGXecV1ltviwAMI7Mr-gzjjr8RDviUohxnaUNKN6YAOew1oYHVVSYSdaRDnTeRd7tDahWTKBcvTc9AgOtxof5oD6B8lrdogX6AGAoAH9OT9Bg&num=1&sig=AOD64_3Kpqfig1G2pEyFpoGXuaOtne-flA&client=ca-pub-8090601437064582&adurl=http://www.comparecards.com/category/low-interest%3Fk%3D555-3%26aw_cam%3DDisplay_Campaign_Optimizer%26aw_adg%3DDCO%26aw_med%3Dcontent%26aw_pla%3Dwww.thegeekstuff.com%26aw_cre%3D16268288688%26aw_tar%3Dundetermined%26aw_key%3Dhttp://pdfcrowd.com/http://pdfcrowd.com/redirect/?url=http%3a%2f%2fwww.thegeekstuff.com%2f2013%2f02%2fstack-smashing-attacks-gcc%2f%3futm_source%3dfeedburner%26utm_medium%3demail%26utm_campaign%3dFee&id=ma-130208010252-bfa24504http://pdfcrowd.com/customize/http://pdfcrowd.com/html-to-pdf-api/?ref=pdfhttp://www.thegeekstuff.com/linux-101-hacks-ebook/http://www.thegeekstuff.com/bash-101-hacks-ebook/http://www.thegeekstuff.com/sed-awk-101-hacks-ebook/http://www.thegeekstuff.com/vim-101-hacks-ebook/http://googleads.g.doubleclick.net/aclk?sa=l&ai=CSpmfCZUUUe3sBePT0AHnyoB4yIOq5QLghaHzPL_hHhABIKKB1wtQ3cO2lwJgyY78irSk2A-gAfSagvkDyAECqAMByAPdBKoEzgFP0Mvy9OBKeBHRQOzIydt55O_I5kXN9ZE2Pj16N1hJkT-G7Q91sDaw0B975p4PnCk4pvqIu0KWev3qxCbXQWz2wf85vwX1gEJ3Kj8NRcPRG4bqH2Nw_O56rkinnFtrXhrAOKjdqDq-aiVmCo1Canujx9E9USIQxTCdEFETbMtTUy0urdoJkCGXecV1ltviwAMI7Mr-gzjjr8RDviUohxnaUNKN6YAOew1oYHVVSYSdaRDnTeRd7tDahWTKBcvTc9AgOtxof5oD6B8lrdogX6AGAoAH9OT9Bg&num=1&sig=AOD64_3Kpqfig1G2pEyFpoGXuaOtne-flA&client=ca-pub-8090601437064582&adurl=http://www.comparecards.com/category/low-interest%3Fk%3D555-3%26aw_cam%3DDisplay_Campaign_Optimizer%26aw_adg%3DDCO%26aw_med%3Dcontent%26aw_pla%3Dwww.thegeekstuff.com%26aw_cre%3D16268288688%26aw_tar%3Dundetermined%26aw_key%3D
  • 7/29/2019 Www Thegeekstuff Com 2013 02 Stack Smashing Attacks Gcc Utm

    3/7

    pdfcrowd comopen in browser PRO version Are you a developer? Try out the HTML to PDF API

    08048000-08049000 r-xp 00000000 08:06 528260 /home/himanshu/practice/stacksmash

    08049000-0804a000 r--p 00000000 08:06 528260 /home/himanshu/practice/stacksmash

    0804a000-0804b000 rw-p 00001000 08:06 528260 /home/himanshu/practice/stacksmash

    0973a000-0975b000 rw-p 00000000 00:00 0 [heap]

    b75af000-b75cb000 r-xp 00000000 08:06 787381 /lib/i386-linux-gnu/libgcc_s.so.1

    b75cb000-b75cc000 r--p 0001b000 08:06 787381 /lib/i386-linux-gnu/libgcc_s.so.1

    b75cc000-b75cd000 rw-p 0001c000 08:06 787381 /lib/i386-linux-gnu/libgcc_s.so.1

    b75df000-b75e0000 rw-p 00000000 00:00 0

    b75e0000-b7783000 r-xp 00000000 08:06 787152 /lib/i386-linux-gnu/libc-2.15.so

    b7783000-b7784000 ---p 001a3000 08:06 787152 /lib/i386-linux-gnu/libc-2.15.so

    b7784000-b7786000 r--p 001a3000 08:06 787152 /lib/i386-linux-gnu/libc-2.15.so

    b7786000-b7787000 rw-p 001a5000 08:06 787152 /lib/i386-linux-gnu/libc-2.15.so

    b7787000-b778a000 rw-p 00000000 00:00 0

    b7799000-b779e000 rw-p 00000000 00:00 0

    b779e000-b779f000 r-xp 00000000 00:00 0 [vdso]

    b779f000-b77bf000 r-xp 00000000 08:06 794147 /lib/i386-linux-gnu/ld-2.15.so

    b77bf000-b77c0000 r--p 0001f000 08:06 794147 /lib/i386-linux-gnu/ld-2.15.so

    b77c0000-b77c1000 rw-p 00020000 08:06 794147 /lib/i386-linux-gnu/ld-2.15.so

    bfaec000-bfb0d000 rw-p 00000000 00:00 0 [stack]

    Aborted (core dumped)

    Well, this came in as pleasant surprise that the execution environment was somehow able to

    detect that buffer overflow could happen in this case. In the output you can see that stack

    smashing was detected. This prompted me to explore as to how buffer overflow was detected.

    While searching for the reason, I came across a gcc flag -fstack-protector. Here is the

    description of this flag (from the man page) :

    -fstack-protector

    Emit extra code to check for buffer overflows, such as stack smashing attacks. This is done

    by adding a guard variable to functions with vulnerable objects. This includes functions that

    call alloca, and functions with buffers larger than 8 bytes. The guards are initialized when a

    function is entered and then checked when the function exits. If a guard check fails, an

    PO PUL AR PO ST S

    12 Amazing and Essential Linux Books To Enrich YourBrain and Library

    50 UNIX / Linux Sysadmin Tutorials

    50 Most Frequently Used UNIX / Linux Commands (With

    Examples)

    How To Be Productive and Get Things Done Using GTD

    30 Things To Do When you are Bored and have a

    http://pdfcrowd.com/http://pdfcrowd.com/redirect/?url=http%3a%2f%2fwww.thegeekstuff.com%2f2013%2f02%2fstack-smashing-attacks-gcc%2f%3futm_source%3dfeedburner%26utm_medium%3demail%26utm_campaign%3dFee&id=ma-130208010252-bfa24504http://pdfcrowd.com/customize/http://pdfcrowd.com/html-to-pdf-api/?ref=pdfhttp://www.thegeekstuff.com/nagios-core-ebook/http://ad.doubleclick.net/click;h=v8/3d83/0/0/%2a/c;268163866;4-0;0;38965565;4307-300/250;52659571/52613439/1;u=,idgt-11769235851_1360303369,12cdc27fc2892a7,bigdata_db,ax.-bu.-bd.;~aopt=2/1/bd/0;~sscs=%3fhttp://vutelepresence.com/landing-pages/roi/lp-roi.html?source=ibtimeshttp://www.thegeekstuff.com/2009/01/12-amazing-and-essential-linux-books-to-enrich-your-brain-and-library/http://www.thegeekstuff.com/2010/12/50-unix-linux-sysadmin-tutorials/http://www.thegeekstuff.com/2010/11/50-linux-commands/http://www.thegeekstuff.com/2010/08/gtd-getting-things-done/http://www.thegeekstuff.com/2010/03/30-things-to-do-when-you-are-bored-and-have-a-computer/http://www.thegeekstuff.com/2010/03/30-things-to-do-when-you-are-bored-and-have-a-computer/
  • 7/29/2019 Www Thegeekstuff Com 2013 02 Stack Smashing Attacks Gcc Utm

    4/7

    pdfcrowd comopen in browser PRO version Are you a developer? Try out the HTML to PDF API

    error message is printed and the program exits.

    NOTE: In Ubuntu 6.10 and later versions this option is enabled by default for C, C++, ObjC,

    ObjC++, if none of -fno-stack-protector, -nostdlib, nor -ffreestanding are found.

    So you see that gcc has got this flag that emits extra code to check buffer overflows. Now the

    next question that came into my mind was that I never included this flag while compilation then

    how this functionality got enabled. Then I read the last two lines that said for Ubuntu 6.10 this

    functionality is enabled by default.

    Then, as a next step, I decided to deactivate this functionality by using the flag -fno-stack-

    protector while compilation and then try to execute the same use-case that I was doing earlier.

    Here is how I did it :

    $ gcc -Wall -fno-stack-protector stacksmash.c -o stacksmash

    $ ./stacksmash

    Enter the name

    TheGeekStuff

    len = [26214]

    len of string entered is : [12]

    So we see that once the code was compiled with this flag then with the same input, the

    execution environment was not able to detect buffer overflow that actually happened and

    corrupted the value of variable len.

    Also, if you are new to gcc, you should understand the most frequently used gcc compiler

    Linux Directory Structure (File System Structure)

    Explained with Examples

    Linux Crontab: 15 Awesome Cron Job Examples

    Get a Grip on the Grep! 15 Practical Grep Command

    Examples

    Unix LS Command: 15 Practical Examples

    15 Examples To Master Linux Command Line History

    Top 10 Open Source Bug Tracking System

    Vi and Vim Macro Tutorial: How To Record and Play

    Mommy, I found it! -- 15 Practical Linux Find Command

    Examples

    15 Awesome Gmail Tips and Tricks

    15 Awesome Google Search Tips and Tricks

    RAID 0, RAID 1, RAID 5, RAID 10 Explained with

    Diagrams

    Can You Top This? 15 Practical Linux Top Command

    Examples

    Top 5 Best System Monitoring Tools

    Top 5 Best Linux OS Distributions

    How To Monitor Remote Linux Host using Nagios 3.0

    Awk Introduction Tutorial 7 Awk Print Examples

    How to Backup Linux? 15 rsync Command Examples

    The Ultimate Wget Download Guide With 15 Awesome

    Examples

    Top 5 Best Linux Text Editors

    Packet Analyzer: 15 TCPDUMP Command Examples

    The Ultimate Bash Array Tutorial with 15 Examples

    http://www.thegeekstuff.com/2010/03/30-things-to-do-when-you-are-bored-and-have-a-computer/http://pdfcrowd.com/http://pdfcrowd.com/redirect/?url=http%3a%2f%2fwww.thegeekstuff.com%2f2013%2f02%2fstack-smashing-attacks-gcc%2f%3futm_source%3dfeedburner%26utm_medium%3demail%26utm_campaign%3dFee&id=ma-130208010252-bfa24504http://pdfcrowd.com/customize/http://pdfcrowd.com/html-to-pdf-api/?ref=pdfhttp://www.thegeekstuff.com/2012/10/gcc-compiler-options/http://www.thegeekstuff.com/2010/03/30-things-to-do-when-you-are-bored-and-have-a-computer/http://www.thegeekstuff.com/2010/09/linux-file-system-structure/http://www.thegeekstuff.com/2009/06/15-practical-crontab-examples/http://www.thegeekstuff.com/2009/03/15-practical-unix-grep-command-examples/http://www.thegeekstuff.com/2009/07/linux-ls-command-examples/http://www.thegeekstuff.com/2008/08/15-examples-to-master-linux-command-line-history/http://www.thegeekstuff.com/2010/08/bug-tracking-system/http://www.thegeekstuff.com/2009/01/vi-and-vim-macro-tutorial-how-to-record-and-play/http://www.thegeekstuff.com/2009/03/15-practical-linux-find-command-examples/http://www.thegeekstuff.com/2009/07/best-gmail-tips-and-tricks/http://www.thegeekstuff.com/2009/06/expertise-in-google-search/http://www.thegeekstuff.com/2010/08/raid-levels-tutorial/http://www.thegeekstuff.com/2010/01/15-practical-unix-linux-top-command-examples/http://www.thegeekstuff.com/2009/09/top-5-best-network-monitoring-tools/http://www.thegeekstuff.com/2009/06/top-5-best-linux-os-distributions/http://www.thegeekstuff.com/2008/06/how-to-monitor-remote-linux-host-using-nagios-30/http://www.thegeekstuff.com/2010/01/awk-introduction-tutorial-7-awk-print-examples/http://www.thegeekstuff.com/2010/09/rsync-command-examples/http://www.thegeekstuff.com/2009/09/the-ultimate-wget-download-guide-with-15-awesome-examples/http://www.thegeekstuff.com/2009/07/top-5-best-linux-text-editors/http://www.thegeekstuff.com/2010/08/tcpdump-command-examples/http://www.thegeekstuff.com/2010/06/bash-array-tutorial/http://www.thegeekstuff.com/2012/10/gcc-compiler-options/
  • 7/29/2019 Www Thegeekstuff Com 2013 02 Stack Smashing Attacks Gcc Utm

    5/7

    pdfcrowd comopen in browser PRO version Are you a developer? Try out the HTML to PDF API

    7 Tweet 1 ShareLike 5

    options that we discussed earlier.

    Comment

    If you enjoyed this article, you might also like..

    1. 50 Linux Sysadmin Tutorials2. 50 Most Frequently Used Linux Commands

    (With Examples)

    3. Top 25 Best Linux Performance Monitoring

    and Debugging Tools

    4. Mommy, I found it! 15 Practical Linux Find

    Command Examples

    5. Linux 101 Hacks 2nd Edition eBook

    Awk Introduction 7 Awk Print ExamplesAdvanced Sed Substitution Examples

    8 Essential Vim Editor Navigation

    Fundamentals

    25 Most Frequently Used Linux IPTables

    Rules Examples

    Turbocharge PuTTY with 12 Powerful

    Add-Ons

    Tags: Buffer Overflow Tutorial , Buffer Overrun Detected, Prevent Buffer Overflow, Stack Smashing Detected

    3 Steps to Perform SSH Login Without Password Using

    ssh-keygen & ssh-copy-id

    Unix Sed Tutorial: Advanced Sed Substitution Examples

    UNIX / Linux: 10 Netstat Command Examples

    The Ultimate Guide for Creating Strong Passwords

    6 Steps to Secure Your Home Wireless Network

    Turbocharge PuTTY with 12 Powerful Add-Ons

    http://www.thegeekstuff.com/2012/10/gcc-compiler-options/http://www.thegeekstuff.com/2012/10/gcc-compiler-options/http://www.thegeekstuff.com/2012/10/gcc-compiler-options/http://pdfcrowd.com/redirect/?url=http%3a%2f%2fwww.thegeekstuff.com%2f2013%2f02%2fstack-smashing-attacks-gcc%2f%3futm_source%3dfeedburner%26utm_medium%3demail%26utm_campaign%3dFee&id=ma-130208010252-bfa24504http://pdfcrowd.com/redirect/?url=http%3a%2f%2fwww.thegeekstuff.com%2f2013%2f02%2fstack-smashing-attacks-gcc%2f%3futm_source%3dfeedburner%26utm_medium%3demail%26utm_campaign%3dFee&id=ma-130208010252-bfa24504http://pdfcrowd.com/redirect/?url=http%3a%2f%2fwww.thegeekstuff.com%2f2013%2f02%2fstack-smashing-attacks-gcc%2f%3futm_source%3dfeedburner%26utm_medium%3demail%26utm_campaign%3dFee&id=ma-130208010252-bfa24504http://pdfcrowd.com/redirect/?url=http%3a%2f%2fwww.thegeekstuff.com%2f2013%2f02%2fstack-smashing-attacks-gcc%2f%3futm_source%3dfeedburner%26utm_medium%3demail%26utm_campaign%3dFee&id=ma-130208010252-bfa24504http://pdfcrowd.com/redirect/?url=http%3a%2f%2fwww.thegeekstuff.com%2f2013%2f02%2fstack-smashing-attacks-gcc%2f%3futm_source%3dfeedburner%26utm_medium%3demail%26utm_campaign%3dFee&id=ma-130208010252-bfa24504http://pdfcrowd.com/http://pdfcrowd.com/redirect/?url=http%3a%2f%2fwww.thegeekstuff.com%2f2013%2f02%2fstack-smashing-attacks-gcc%2f%3futm_source%3dfeedburner%26utm_medium%3demail%26utm_campaign%3dFee&id=ma-130208010252-bfa24504http://pdfcrowd.com/customize/http://pdfcrowd.com/html-to-pdf-api/?ref=pdfhttps://twitter.com/intent/tweet?original_referer=http%3A%2F%2Fwww.thegeekstuff.com%2F2013%2F02%2Fstack-smashing-attacks-gcc%2F%3Futm_source%3Dfeedburner%26utm_medium%3Demail%26utm_campaign%3DFee&text=How%20to%20Avoid%20Stack%20Smashing%20Attacks%20with%20GCC&tw_p=tweetbutton&url=http%3A%2F%2Fwww.thegeekstuff.com%2F2013%2F02%2Fstack-smashing-attacks-gcc%2Fhttp://twitter.com/search?q=http%3A%2F%2Fwww.thegeekstuff.com%2F2013%2F02%2Fstack-smashing-attacks-gcc%2Fhttp://www.addthis.com/bookmark.php?v=250&pub=xa-4ac6c0d77fc11b75http://www.thegeekstuff.com/2012/10/gcc-compiler-options/http://www.thegeekstuff.com/2010/12/50-unix-linux-sysadmin-tutorials/http://www.thegeekstuff.com/2010/11/50-linux-commands/http://www.thegeekstuff.com/2011/12/linux-performance-monitoring-tools/http://www.thegeekstuff.com/2009/03/15-practical-linux-find-command-examples/http://www.thegeekstuff.com/linux-101-hacks-ebook/http://www.thegeekstuff.com/2010/01/awk-introduction-tutorial-7-awk-print-examples/http://www.thegeekstuff.com/2009/10/unix-sed-tutorial-advanced-sed-substitution-examples/http://www.thegeekstuff.com/2009/03/8-essential-vim-editor-navigation-fundamentals/http://www.thegeekstuff.com/2011/06/iptables-rules-examples/http://www.thegeekstuff.com/2008/08/turbocharge-putty-with-12-powerful-add-ons-software-for-geeks-3/http://www.thegeekstuff.com/bash-101-hacks-ebook/http://www.thegeekstuff.com/sed-awk-101-hacks-ebook/http://www.thegeekstuff.com/nagios-core-ebook/http://www.thegeekstuff.com/vim-101-hacks-ebook/http://www.thegeekstuff.com/tag/buffer-overflow-tutorial/http://www.thegeekstuff.com/tag/buffer-overrun-detected/http://www.thegeekstuff.com/tag/prevent-buffer-overflow/http://www.thegeekstuff.com/tag/stack-smashing-detected/http://www.thegeekstuff.com/2008/11/3-steps-to-perform-ssh-login-without-password-using-ssh-keygen-ssh-copy-id/http://www.thegeekstuff.com/2009/10/unix-sed-tutorial-advanced-sed-substitution-examples/http://www.thegeekstuff.com/2010/03/netstat-command-examples/http://www.thegeekstuff.com/2008/06/the-ultimate-guide-for-creating-strong-passwords/http://www.thegeekstuff.com/2008/08/6-steps-to-secure-your-home-wireless-network/http://www.thegeekstuff.com/2008/08/turbocharge-putty-with-12-powerful-add-ons-software-for-geeks-3/
  • 7/29/2019 Www Thegeekstuff Com 2013 02 Stack Smashing Attacks Gcc Utm

    6/7

    pdfcrowd comopen in browser PRO version Are you a developer? Try out the HTML to PDF API

    Leave a Comment

    Name

    E-mail

    Website

    Notify me of followup comments via e-mail

    Submit

    P R E V I O U S P O S T : How to Encrypt and Decrypt a File using GnuPG in Linux

    About The Geek Stuff

    My name is Ramesh Natarajan. I

    will be posting instruction guides,

    how-to, troubleshooting tips and

    tricks on Linux, database, hardware,

    security and web. My focus is to

    Support Us

    Support this blog by purchasing one of my

    ebooks.

    Bash 101 Hacks eBook

    Contact Us

    Email Me : Use this Contact Form to get in

    touch me with your comments, questions or

    suggestions about this site. You can also simply

    drop me a line to say hello!.

    http://pdfcrowd.com/http://pdfcrowd.com/redirect/?url=http%3a%2f%2fwww.thegeekstuff.com%2f2013%2f02%2fstack-smashing-attacks-gcc%2f%3futm_source%3dfeedburner%26utm_medium%3demail%26utm_campaign%3dFee&id=ma-130208010252-bfa24504http://pdfcrowd.com/customize/http://pdfcrowd.com/html-to-pdf-api/?ref=pdfhttp://www.thegeekstuff.com/2013/02/gpg-encrypt-decrypt/http://www.thegeekstuff.com/bash-101-hacks-ebook/http://www.thegeekstuff.com/contact
  • 7/29/2019 Www Thegeekstuff Com 2013 02 Stack Smashing Attacks Gcc Utm

    7/7

    df d mi b PRO i Are you a developer? Try out the HTML to PDF API

    write articles that will either teach

    you or help you resolve a problem.

    Read more about Ramesh Natarajan and the blog.

    Sed and Awk 101 Hacks eBook

    Vim 101 Hacks eBook

    Nagios Core 3 eBook

    Follow us on Twitter

    Become a fan on Facebook

    Copyright 20082013 Rames h Natarajan. All rights reserved | Terms of Service |Advertise

    http://pdfcrowd.com/http://pdfcrowd.com/redirect/?url=http%3a%2f%2fwww.thegeekstuff.com%2f2013%2f02%2fstack-smashing-attacks-gcc%2f%3futm_source%3dfeedburner%26utm_medium%3demail%26utm_campaign%3dFee&id=ma-130208010252-bfa24504http://pdfcrowd.com/customize/http://pdfcrowd.com/html-to-pdf-api/?ref=pdfhttp://www.thegeekstuff.com/about/http://www.thegeekstuff.com/sed-awk-101-hacks-ebook/http://www.thegeekstuff.com/vim-101-hacks-ebook/http://www.thegeekstuff.com/nagios-core-ebook/http://twitter.com/thegeekstuffhttp://www.thegeekstuff.com/2013/02/stack-smashing-attacks-gcc/http://www.facebook.com/thegeekstuffhttp://www.thegeekstuff.com/copyrighthttp://www.thegeekstuff.com/advertisehttp://ad.doubleclick.net/click%3Bh%3Dv8/3d83/3/0/%2a/u%3B268287010%3B1-0%3B0%3B94138081%3B3454-728/90%3B52196442/52156090/1%3Bu%3D%2Cidgt-11472136352_1360303370%2C12cdc27fc2892a7%2Cbigdata_db%2Cax.-bu.-bd.-idgt.bigdata_db_l%3B~aopt%3D0/ff/bd/ff%3B~fdr%3D268329592%3B0-0%3B0%3B38965644%3B3454-728/90%3B52713871/52667064/1%3Bu%3D%2Cidgt-11472136352_1360303370%2C12cdc27fc2892a7%2Cbigdata_db%2Cax.-bu.-bd.-idgt.bigdata_db_l%3B~aopt%3D2/1/bd/0%3B~sscs%3D%3fhttp://try.quickbase.intuit.com/displaybrand