Advertisement
Guest User

Untitled

a guest
Sep 15th, 2013
86
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.16 KB | None | 0 0
  1. Mode: Kiddie
  2. Linux b0x 3.2.0-48-generic-pae #74-Ubuntu SMP Thu Jun 6 20:05:01 UTC 2013 i686 athlon i386 GNU/Linux
  3.  
  4. Executable anonymous mapping : Killed
  5. Executable bss : Killed
  6. Executable data : Killed
  7. Executable heap : Killed
  8. Executable stack : Killed
  9. Executable shared library bss : Killed
  10. Executable shared library data : Killed
  11. Executable anonymous mapping (mprotect) : Vulnerable
  12. Executable bss (mprotect) : Vulnerable
  13. Executable data (mprotect) : Vulnerable
  14. Executable heap (mprotect) : Vulnerable
  15. Executable stack (mprotect) : Vulnerable
  16. Executable shared library bss (mprotect) : Vulnerable
  17. Executable shared library data (mprotect): Vulnerable
  18. Writable text segments : Vulnerable
  19. Anonymous mapping randomisation test : 9 bits (guessed)
  20. Heap randomisation test (ET_EXEC) : 13 bits (guessed)
  21. Heap randomisation test (PIE) : 16 bits (guessed)
  22. Main executable randomisation (ET_EXEC) : No randomisation
  23. Main executable randomisation (PIE) : 8 bits (guessed)
  24. Shared library randomisation test : 10 bits (guessed)
  25. Stack randomisation test (SEGMEXEC) : 19 bits (guessed)
  26. Stack randomisation test (PAGEEXEC) : 19 bits (guessed)
  27. Return to function (strcpy) : Vulnerable
  28. Return to function (memcpy) : Return to function (strcpy, PIE) : Vulnerable
  29. Return to function (memcpy, PIE) :
  30.  
  31. Mode: Blackhat
  32. Linux b0x 3.2.0-48-generic-pae #74-Ubuntu SMP Thu Jun 6 20:05:01 UTC 2013 i686 athlon i386 GNU/Linux
  33.  
  34. Executable anonymous mapping : Killed
  35. Executable bss : Killed
  36. Executable data : Killed
  37. Executable heap : Killed
  38. Executable stack : Killed
  39. Executable shared library bss : Killed
  40. Executable shared library data : Killed
  41. Executable anonymous mapping (mprotect) : Vulnerable
  42. Executable bss (mprotect) : Vulnerable
  43. Executable data (mprotect) : Vulnerable
  44. Executable heap (mprotect) : Vulnerable
  45. Executable stack (mprotect) : Vulnerable
  46. Executable shared library bss (mprotect) : Vulnerable
  47. Executable shared library data (mprotect): Vulnerable
  48. Writable text segments : Vulnerable
  49. Anonymous mapping randomisation test : 9 bits (guessed)
  50. Heap randomisation test (ET_EXEC) : 13 bits (guessed)
  51. Heap randomisation test (PIE) : 16 bits (guessed)
  52. Main executable randomisation (ET_EXEC) : No randomisation
  53. Main executable randomisation (PIE) : 8 bits (guessed)
  54. Shared library randomisation test : 10 bits (guessed)
  55. Stack randomisation test (SEGMEXEC) : 19 bits (guessed)
  56. Stack randomisation test (PAGEEXEC) : 19 bits (guessed)
  57. Return to function (strcpy) : Vulnerable
  58. Return to function (memcpy) : Killed
  59. Return to function (strcpy, PIE) : Vulnerable
  60. Return to function (memcpy, PIE) : Killed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement