This is what it paxtest looks like if you run it on a Debian GNU/Linux kernel without the Grsecurity patch protections: ---------------------------------------------------------------------- PaXtest - Copyright(c) 2003,2004 by Peter Busser <[EMAIL PROTECTED]> Released under the GNU Public Licence version 2 or later Mode: Blackhat Linux xxxxxxxx 3.10-3-686-pae #1 SMP Debian 3.10.11-1 (2013-09-10) i686 GNU/Linux Executable anonymous mapping : Killed Executable bss : Killed Executable data : Killed Executable heap : Killed Executable stack : Killed Executable shared library bss : Killed Executable shared library data : Killed Executable anonymous mapping (mprotect) : Vulnerable Executable bss (mprotect) : Vulnerable Executable data (mprotect) : Vulnerable Executable heap (mprotect) : Vulnerable Executable stack (mprotect) : Vulnerable Executable shared library bss (mprotect) : Vulnerable Executable shared library data (mprotect): Vulnerable Writable text segments : Vulnerable Anonymous mapping randomisation test : 9 bits (guessed) Heap randomisation test (ET_EXEC) : 14 bits (guessed) Heap randomisation test (PIE) : 16 bits (guessed) Main executable randomisation (ET_EXEC) : 10 bits (guessed) Main executable randomisation (PIE) : 10 bits (guessed) Shared library randomisation test : 10 bits (guessed) Stack randomisation test (SEGMEXEC) : 19 bits (guessed) Stack randomisation test (PAGEEXEC) : 19 bits (guessed) Arg/env randomisation test (SEGMEXEC) : 11 bits (guessed) Arg/env randomisation test (PAGEEXEC) : 11 bits (guessed) Randomization under memory exhaustion @~0: No randomisation Randomization under memory exhaustion @0 : No randomisation Return to function (strcpy) : Vulnerable Return to function (memcpy) : Killed Return to function (strcpy, PIE) : Vulnerable Return to function (memcpy, PIE) : Killed
Generated by dwww version 1.15 on Mon Jun 24 13:46:00 CEST 2024.