Skip to main content

All Questions

2 votes
0 answers
58 views

system() returns the error sh: 1: : not found when I try to execute it with "/bin/sh" in the register rdi

I am following a walkthrough of a box on VulnHub, The Planets: Venus. I got the shell to run through a buffer overflow, by putting an 8 byte padding, a gadget(pop rdi; ret), an address pointing to &...
DeceptiveRat's user avatar
0 votes
0 answers
43 views

For Buffer Overflow pentesting, calculator.exe shellcode will not work inside a python file

I am trying Buffer Overflow pentesting, and the idea is to ultimately get the calculator executed. After getting everything right, as in calculating the needed bytes to overflow the buffer and reach ...
D. Park's user avatar
  • 13
-2 votes
1 answer
55 views

eCPPTv2 Buffer overflow exploit development

I'm having ecPPTv2 exam, and I successfully developed the exploit for the buffer overflow section, so I found offset, bad chars and the return address, i debugged with Immunity Debugger and It's all ...
niccolò orlandi's user avatar
-2 votes
1 answer
243 views

Stack or Heap based Buffer overflow? How to Exploit it?

https://pastebin.com/BEvvTmjc int auth_flag = 0; char *password_buffer; char *dept; password_buffer = (char *) malloc (16); dept = (char *) malloc(10); strcpy(password_buffer, password); No ...
MrDoufy's user avatar
0 votes
1 answer
1k views

While scanning for badchars to avoid in a buffer overflow attack, hex number "C2" keeps appearing every second character in the hexdump

I'm learning about buffer overflows because I have an exam on it tomorrow. I've been following this guide, and I'm currently on the step where I'm using immunity debugger to look for badchars. However,...
Johnny Two Shoes's user avatar
1 vote
1 answer
3k views

Buffer Overflow - Finding EIP

I am on Linux kali 5.6.0-kali2-amd64 #1 SMP Debian 5.6.14-1kali1 (2020-05-25) x86_64 GNU/Linux and I am learning to exploit buffer overflows vulnerabilities so I'm quite bad at doing it yet, so ...
scarecrow's user avatar
0 votes
2 answers
471 views

Common Buffer Overflow attacks

I am learning computer security and I am trying to find a list of common buffer overflow attacks, but not having much luck. I am planning on using metasploit for pen-testing as well as backtrack 5, ...
RPiAwesomeness's user avatar
0 votes
2 answers
2k views

How do I get Linux to execute data on the stack?

I have a Core i7 720QM processor and am running Slackware 13.37 (32-bit) as a virtual machine. As a class assignment, I have to write a vulnerable program and smash the stack. However, on most ...
Lord Loh.'s user avatar
  • 2,477

X