Skip to main content
-1 votes
0 answers
37 views

in what instances can a json file that is read become an issue

I am using json store based functioning system written in node.js. it is also storing binary data as string or blob in the file. I am am ingesting like below: function closure (filepath) { var jsonf = ...
Gary's user avatar
  • 2,347
0 votes
0 answers
70 views

Finding the return address of the payload in a simple Buffer Overflow No ASLR (x86 i386) [closed]

Was experimenting for the first time on Buffer Overflows and tried to follow a guide (from HTB) but got stuck at trying to find the return address of the payload. Do you guys know of a method of being ...
c0sx86's user avatar
  • 35
0 votes
0 answers
34 views

Why Can I Only Overwrite 6 Bytes of RIP in a Buffer Overflow on Ubuntu 22.04?

I’m testing a simple buffer overflow on Ubuntu 22.04 (kernel 6.8.0-52-generic) and encountering this issue: I can overwrite RIP with only 6 bytes. If I try to overwrite all 8 bytes, RIP resets to a ...
r4xis's user avatar
  • 1
0 votes
1 answer
88 views

Understanding buffer overflow output, when accessing the hidden function

Sorry if this is the wrong format. Im currently doing a CTF and have a problem where i have to overflow a buffer, to get access to a /bin/sh hidden function, where i then can get a flag. I think i ...
Egelund48's user avatar
1 vote
2 answers
84 views

Is this actually a buffer overflow, or is the author mistaken?

I came across this page here when looking for buffer overflow examples: https://learn.microsoft.com/en-us/cpp/sanitizers/error-heap-buffer-overflow?view=msvc-170 In this, they mention this code as an ...
user185543's user avatar
2 votes
1 answer
125 views

Buffer Overflow Exploit - Injecting Code & Redirecting Execution in Attack Lab (x86-64, GDB Debugging)

Here's a revised and well-structured Stack Overflow post incorporating all necessary improvements: Buffer Overflow Exploit (x86-64, Attack Lab Phase 2) - Injecting Shellcode for Function Call ...
Toan Lam's user avatar
  • 139
0 votes
0 answers
21 views

How to buffer overflow this

\`#include \<iostream\> #include \<cstring\> void secretFunction() { std::cout \<\< " Exploit Successful! You've gained control! " \<\< std::endl; } void ...
user29808270's user avatar
2 votes
0 answers
152 views

Why is code vulnerable to buffer overflow? [closed]

Veracode reported: This call to ReadFile() contains a potential buffer overflow. The specified size of 92 bytes is larger than the space allocated to the destination buffer (88 bytes). The code: ...
isobretatel's user avatar
  • 3,978
0 votes
1 answer
125 views

How is a heap overflow attack implemented?

I am learning about heap overflow attacks, but I am encountering a problem. Based on the knowledge I found online and my own guesses, I believe that a heap overflow attack involves overwriting ...
ho tian's user avatar
  • 31
0 votes
0 answers
22 views

Error *** buffer overflow detected *** in CRAN check on r-devel-linux-x86_64-debian-clang

I have a package on CRAN that apparently from September last year started having *** buffer overflow detected *** problems in the CRAN checks. The error only occurs on r-devel-linux-x86_64-debian-...
user29139280's user avatar
2 votes
0 answers
57 views

system() returns the error sh: 1: : not found when I try to execute it with "/bin/sh" in the register rdi

I am following a walkthrough of a box on VulnHub, The Planets: Venus. I got the shell to run through a buffer overflow, by putting an 8 byte padding, a gadget(pop rdi; ret), an address pointing to &...
DeceptiveRat's user avatar
1 vote
1 answer
139 views

Why are functions b and f called *twice* in this code after b overwrites its return address with &f (32-bit MSVC debug build)?

I have a very strange code, which as far as I understand, replaces the return address of the function b, and thus the function f is called from it. But I do not quite understand why after the function ...
Oliver's user avatar
  • 21
0 votes
2 answers
63 views

Overflow when encoding a structure into bytes into a buffer

I wrote this function that should write a structure of data into a buffer of bytes then returns how many have been written. The function does the following: ask as input a buffer of bytes (char *), ...
magg's user avatar
  • 65
0 votes
1 answer
114 views

Buffer Overflow strange behavior for RIP

I run test i gdb to exploit an buffer overflow, when testing with: (gdb) r $(python3 -c 'print(b"\x41"*152+"\x42"*6 )') (gdb) i r ... rbp 0x4141414141414141 ...
user27263189's user avatar
0 votes
0 answers
103 views

Failed to construct a Palindromic Shellcode

To exploit the buffer overflow vulnerability in a challenge program, I need to craft a payload that satisfies a palindrome check and executes arbitrary code. This requires creating a palindromic ...
user27263189's user avatar

15 30 50 per page
1
2 3 4 5
103