All Questions
Tagged with penetration-testing buffer-overflow
8 questions
2
votes
0
answers
58
views
system() returns the error sh: 1: : not found when I try to execute it with "/bin/sh" in the register rdi
I am following a walkthrough of a box on VulnHub, The Planets: Venus.
I got the shell to run through a buffer overflow, by putting an 8 byte padding, a gadget(pop rdi; ret), an address pointing to &...
0
votes
0
answers
43
views
For Buffer Overflow pentesting, calculator.exe shellcode will not work inside a python file
I am trying Buffer Overflow pentesting, and the idea is to ultimately get the calculator executed. After getting everything right, as in calculating the needed bytes to overflow the buffer and reach ...
-2
votes
1
answer
55
views
eCPPTv2 Buffer overflow exploit development
I'm having ecPPTv2 exam, and I successfully developed the exploit for the buffer overflow section, so I found offset, bad chars and the return address, i debugged with Immunity Debugger and It's all ...
-2
votes
1
answer
243
views
Stack or Heap based Buffer overflow? How to Exploit it?
https://pastebin.com/BEvvTmjc
int auth_flag = 0;
char *password_buffer;
char *dept;
password_buffer = (char *) malloc (16);
dept = (char *) malloc(10);
strcpy(password_buffer, password);
No ...
0
votes
1
answer
1k
views
While scanning for badchars to avoid in a buffer overflow attack, hex number "C2" keeps appearing every second character in the hexdump
I'm learning about buffer overflows because I have an exam on it tomorrow.
I've been following this guide, and I'm currently on the step where I'm using immunity debugger to look for badchars. However,...
1
vote
1
answer
3k
views
Buffer Overflow - Finding EIP
I am on
Linux kali 5.6.0-kali2-amd64 #1 SMP Debian 5.6.14-1kali1 (2020-05-25) x86_64 GNU/Linux and
I am learning to exploit buffer overflows vulnerabilities so I'm quite bad at doing it yet, so ...
0
votes
2
answers
471
views
Common Buffer Overflow attacks
I am learning computer security and I am trying to find a list of common buffer overflow attacks, but not having much luck.
I am planning on using metasploit for pen-testing as well as backtrack 5, ...
0
votes
2
answers
2k
views
How do I get Linux to execute data on the stack?
I have a Core i7 720QM processor and am running Slackware 13.37 (32-bit) as a virtual machine. As a class assignment, I have to write a vulnerable program and smash the stack. However, on most ...