Skip to main content

All Questions

Tagged with
2 votes
4 answers
2k views

Shellcode as payload for buffer overflow (or other) exploits executed as root?

When I use shellcode such as the ones provided here* as payload to some vulnerable program, how is the shell executed as root? I am asking about how the privileges are elevated to root? The shellcode ...
extraeee's user avatar
  • 3,196
5 votes
1 answer
3k views

Intentional buffer overflow exploit program

I'm trying to figure out this problem for one of my comp sci classes, I've utilized every resource and still having issues, if someone could provide some insight, I'd greatly appreciate it. I have ...
CRO's user avatar
  • 53