Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Mode: Kiddie
- Linux b0x 3.2.0-48-generic-pae #74-Ubuntu SMP Thu Jun 6 20:05:01 UTC 2013 i686 athlon i386 GNU/Linux
- Executable anonymous mapping : Killed
- Executable bss : Killed
- Executable data : Killed
- Executable heap : Killed
- Executable stack : Killed
- Executable shared library bss : Killed
- Executable shared library data : Killed
- Executable anonymous mapping (mprotect) : Vulnerable
- Executable bss (mprotect) : Vulnerable
- Executable data (mprotect) : Vulnerable
- Executable heap (mprotect) : Vulnerable
- Executable stack (mprotect) : Vulnerable
- Executable shared library bss (mprotect) : Vulnerable
- Executable shared library data (mprotect): Vulnerable
- Writable text segments : Vulnerable
- Anonymous mapping randomisation test : 9 bits (guessed)
- Heap randomisation test (ET_EXEC) : 13 bits (guessed)
- Heap randomisation test (PIE) : 16 bits (guessed)
- Main executable randomisation (ET_EXEC) : No randomisation
- Main executable randomisation (PIE) : 8 bits (guessed)
- Shared library randomisation test : 10 bits (guessed)
- Stack randomisation test (SEGMEXEC) : 19 bits (guessed)
- Stack randomisation test (PAGEEXEC) : 19 bits (guessed)
- Return to function (strcpy) : Vulnerable
- Return to function (memcpy) : Return to function (strcpy, PIE) : Vulnerable
- Return to function (memcpy, PIE) :
- Mode: Blackhat
- Linux b0x 3.2.0-48-generic-pae #74-Ubuntu SMP Thu Jun 6 20:05:01 UTC 2013 i686 athlon i386 GNU/Linux
- Executable anonymous mapping : Killed
- Executable bss : Killed
- Executable data : Killed
- Executable heap : Killed
- Executable stack : Killed
- Executable shared library bss : Killed
- Executable shared library data : Killed
- Executable anonymous mapping (mprotect) : Vulnerable
- Executable bss (mprotect) : Vulnerable
- Executable data (mprotect) : Vulnerable
- Executable heap (mprotect) : Vulnerable
- Executable stack (mprotect) : Vulnerable
- Executable shared library bss (mprotect) : Vulnerable
- Executable shared library data (mprotect): Vulnerable
- Writable text segments : Vulnerable
- Anonymous mapping randomisation test : 9 bits (guessed)
- Heap randomisation test (ET_EXEC) : 13 bits (guessed)
- Heap randomisation test (PIE) : 16 bits (guessed)
- Main executable randomisation (ET_EXEC) : No randomisation
- Main executable randomisation (PIE) : 8 bits (guessed)
- Shared library randomisation test : 10 bits (guessed)
- Stack randomisation test (SEGMEXEC) : 19 bits (guessed)
- Stack randomisation test (PAGEEXEC) : 19 bits (guessed)
- Return to function (strcpy) : Vulnerable
- Return to function (memcpy) : Killed
- Return to function (strcpy, PIE) : Vulnerable
- Return to function (memcpy, PIE) : Killed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement