An exploit is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch, or vulnerability in order to cause unintended or unanticipated behavior to occur. This frequently includes such things as gaining control of a computer system, allowing privilege escalation, or a denial of service attack.
Questions tagged [exploit]
790 questions
3
votes
2 answers
How are clientside security vulnerabilities generally discovered?
I mean in operating systems or their applications. The only way I can think of is examine binaries for the use of dangerous functions like strcpy(), and then try to exploit those. Though with compiler improvements like Visual Studio's /GS switch…

Jehjoa
- 551
- 8
- 23
3
votes
1 answer
Write buffer overflow exploit -- how to figure out the address of the shellcode?
When writing buffer overflow exploit, I understand that I'll need to input an array of length (address_of_return_address - address_of_buffer). And the array needs to be filled with the address of the shellcode. So that when my input array overflows,…

ccczhang
- 67
- 1
- 2
- 8
3
votes
1 answer
How to detect/prevent third party code dialling home?
Context:
Third-party code is common to any open-source CMS e.g WordPress plugins and themes. I've recently encountered articles online regarding plugins/themes sending information to authors.
My concern:
I cannot tell WHEN a plugin/theme is sending…

Clarus Dignus
- 3,847
- 3
- 31
- 57
3
votes
0 answers
What is a specific example of how the Shellshock Bash bug could be exploited?
I read some articles (article1, article2, article3) about the Shellshock Bash bug (CVE-2014-6271 reported Sep 24, 2014) and have a general idea of what the vulnerability is and how it could be exploited. To better understand the implications of the…

Rob Bednark
- 25,981
- 23
- 80
- 125
3
votes
1 answer
Buffer overflow - Program terminated with signal SIGSEGV
I'm learning buffer overflow exploiting. I wrote a vulnerable program like this:
#include
#include
main(int argc, char *argv[])
{
char buffer[80];
strcpy(buffer, argv[1]);
return 1;
}
Very simple program. The idea…

Peter
- 141
- 1
- 1
- 5
3
votes
2 answers
Where does the "payload" in the "payload.encoded" come from in a metasploit's exploit?
I am analyzing a metasploit exploit here and I am trying to figure out where does the payload in payload.encoded come from on line 358. I am newbie to exploit development but basic programming rules say that payload should be initialized before…

TheRookierLearner
- 3,643
- 8
- 35
- 53
3
votes
3 answers
PHP magic_quotes_gpc vulnerability
I've been assigned to one of my company's legacy webapps, and after a day or two of poking around the source, I've found an SQL injection vector similar to the following:
mysql_query("SELECT * FROM foo WHERE bar='" . $_GET['baz'] . "'");
I've tried…

James K.
- 31
- 1
- 2
3
votes
2 answers
How to find the in-memory address of a specific instruction in a DLL
How can I find the in-memory address (for exploit writing) of a specific instruction?
Specifically, I'm looking for a call ebp instruction in user32.dll on Windows XP with no Service Pack whose address I can point EIP to. I have both Immunity…

Freedom_Ben
- 11,247
- 10
- 69
- 89
3
votes
3 answers
Python security: Danger of uncollected variables out of scope
I have a method in a class which decrypts a variable, and returns it. I remove the returned variable with "del" after use.
What is the danger of these garbage values being accessed...and how can I best protect myself from them?
Here is the…

RightmireM
- 2,381
- 2
- 24
- 42
3
votes
2 answers
Rails app exploited, how to find which exploit?
I've received a mail from somebody who pretends to have hacked my server, giving a few info about the server, and asking me to pay if I don't want the data to be posted online.
All the apps on the server are rails apps, and some of them were not up…

Seb K
- 31
- 1
3
votes
1 answer
Buffer overflow on remote server
I'm a computer security student and I'm doing a project about remote buffer overflows. I developed a vulnerable server in C, with an unsafe use of strncpy function which actually copies 1024 bytes on a 512-bytes buffer, and an exploit to test the…

manco
- 31
- 1
- 2
3
votes
1 answer
In Linux, does the location of an executable affect how the setuid bit is interpreted?
In a Linux system, does the permissions of the directory in which a setuid program resides affect how the kernel launches the process? The reason I ask is that when I compiled an identical setuid program in two different directories, it only…

Mr. Shickadance
- 5,283
- 9
- 45
- 61
3
votes
1 answer
Format string attack in printf
#include
int main()
{
char s[200]
int a=123;
int b=&a;
scanf("%50s",s);
printf(s);
if (a==31337)
func();
}
The aim is to execute a format string attack - to execute func() by inputting a string. I tried to…

Jaroszewski Piotr
- 353
- 1
- 3
- 11
3
votes
1 answer
Disable backtrace
I'm training on heap overflow exploit on my backtrack 5 laptop. However, backtrack seems to have a protection against these attacks. Here is what I get when i try to corrupt meta data of malloc's allocated chunks.
Starting program:…

joub
- 117
- 10
3
votes
2 answers
How to guard against Resource exhaustion and other vulnerabilities?
We happened to use IBM appscan http://www-01.ibm.com/software/awdtools/appscan/
against our java codebase, and it returned around 3000 high severity vulnerabilities.
Most of them happen to be System Information Leak, which it thinks is happening…

roymustang86
- 8,054
- 22
- 70
- 101