From: Daniel Grzelak (daniel.grzelak@sift.com.au)
Date: Mon Jan 31 2005 - 20:13:49 EST
Hi,
I am currently researching exploitation techniques specific to C#. The idea
behind this being the future application of such research to penetration
testing.
Browsing the web I have been able to identify a number of resources on
secure coding guidelines for .net and C# however I was unable to locate any
information on the exploitation of issues specific to C#. Obviously the
standard buffer overflow and related bugs are out of the question because
all memory is handled automatically, however there *must* be problems that
relate only to C# and/or .Net.
So my query is this - could anyone point me to some resources or perhaps
provide information on the exploitation and detection of C# specific
problems?
Thank you in advance.
Regards,
Daniel Grzelak
Associate
SIFT
www.sift.com.au
P: +61 2 9236 7276
F: +61 2 9236 7271
M: +61 410 566 549
E: daniel.grzelak@sift.com.au
Suite 2, Level 7
22 Pitt St, Sydney NSW 2000
Australia
"SIFT is a leading Australian pure-play information security consulting,
intelligence and training firm. We specialise in the delivery of
independent advice, reviews and recommendations to the senior management of
large, highly-regulated organisations."
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:15 EDT