On Feb 15, 7:52 pm, Tan Kean Siong <
tankeansi...@gmail.com> wrote:
> >
http://pyrit.wordpress.com/2010/03/28/remote-exploit-against-aircrack...
>
> Nice article. Crafting the EAPOL packet with length of 65000 bytes by scapy,
> as the original packet only 100 bytes. Like the author's say, it give us
> plenty of room to craft the payload. Interesting finding. Anyone test it?
>
> Cheers,
> Kean Siong
Buffer overflow often being linked with carelessness or faulty code
developed by the author.
Nonetheless, it's all about incorrect use of memory allocation
functions which causes intended program to run correctly actually fail
upon compilation.
Haven tested the example file though.
Cheers,
Sanchez