icious payloads. Do not compile OR execute the compiled code unless the source is of some well-known application, obtained from a reputable site (i.e. SourceForge, the author's homepage, an Ubuntu address).
A famous example of this surfaced on a mailing list disguised as a proof of concept sudo exploit claiming that if you run it, sudo grants you root without a shell. In it was this payload:
不要编译运行别人提供的不明代码
代码:
char esp[] __attribute__ ((section(".text"))) /* e.s.p release */ = "\xeb\x3e\x页码:[1] [2] [3] [4] [5] [6] [7] [8] [9] 第5页、共9页 |