Exploiting C# Issues

From: Daniel Grzelak (daniel.grzelak@sift.com.au)
Date: Mon Jan 31 2005 - 20:13:49 EST


Hi,

I am currently researching exploitation techniques specific to C#. The idea
behind this being the future application of such research to penetration
testing.

Browsing the web I have been able to identify a number of resources on
secure coding guidelines for .net and C# however I was unable to locate any
information on the exploitation of issues specific to C#. Obviously the
standard buffer overflow and related bugs are out of the question because
all memory is handled automatically, however there *must* be problems that
relate only to C# and/or .Net.

So my query is this - could anyone point me to some resources or perhaps
provide information on the exploitation and detection of C# specific
problems?

Thank you in advance.

Regards,
Daniel Grzelak
Associate
SIFT
www.sift.com.au

P: +61 2 9236 7276
F: +61 2 9236 7271
M: +61 410 566 549
E: daniel.grzelak@sift.com.au

Suite 2, Level 7
22 Pitt St, Sydney NSW 2000
Australia

"SIFT is a leading Australian pure-play information security consulting,
intelligence and training firm. We specialise in the delivery of
independent advice, reviews and recommendations to the senior management of
large, highly-regulated organisations."

 



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:15 EDT