Questions tagged [exploit]

An exploit is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch, or vulnerability in order to cause unintended or unanticipated behavior to occur. This frequently includes such things as gaining control of a computer system, allowing privilege escalation, or a denial of service attack.

790 questions
9
votes
2 answers

Is WildFly affected by the log4j 2 vulnerability CVE-2021-44228?

We are using wildfly 10 and 16 in production and a zero-day exploit exists CVE-2021-44228 for log4j for some versions. How can I be sure that none of the code and libraries use a log4j lib that has that issue? I do not use any log4j property file…
Manuel
  • 321
  • 4
  • 13
9
votes
1 answer

MongoDB $regex query and potential exploits

We have a REST API for querying records in a MongoDB. Very simple, something along the following: GET /api/items?q=foo During development, it was convenient to allow regular expressions as the query q. We would simply pass the query parameter to a…
qqilihq
  • 10,794
  • 7
  • 48
  • 89
9
votes
1 answer

Why return-to-libc shell using system() exits immediately?

I'm experimenting control-flow hijacking attacks on programs written in C on Linux. I'm trying to perform a simple ret-2-libc attack on a program with the No-eXecutable-stack countermeasure enabled. For this purpose I'm returning to system()…
Seyed Mohammad
  • 798
  • 10
  • 29
9
votes
3 answers

Accessing 2nd element of an array in a format string vulnerability attack

I'm working on a format-string vulnerability lab, where we're given the following code: #define SECRET1 0x44 #define SECRET2 0x55 int main(int argc, char *argv[]) { char user_input[100]; int *secret; int int_input; int a, b, c, d; /*…
Max
  • 849
  • 9
  • 24
9
votes
3 answers

What is the possible ^null$ exploit reported by LogWatch?

LogWatch is a nice tool that provides daily reports on linux log files. It includes several information summaries, like traffic, users who logged in, who used sudo, relevant kernel messages, IPs that probed the server, search engines that probed…
JulioHM
  • 1,229
  • 1
  • 10
  • 17
8
votes
1 answer

buffer overflow example from Art of Exploitation book

I was reading this book Art of Exploitation, which is kinda good book and I run across that example from exploit_notesearch.c file. Briefly author tries to overflow program from notesearch.c int main(int argc, char *argv[]) { int userid,…
Rustam Issabekov
  • 3,279
  • 6
  • 24
  • 31
8
votes
0 answers

How can I get a corefile for a PE in Python like I can with pwntools for an ELF?

If any of you are familiar with the basics of exploit development, you know that when you exploit a potential buffer overflow, normally to find the offset of your buffer that "clobbered" a specific register you want to modify, you send an input like…
J.Todd
  • 707
  • 1
  • 12
  • 34
8
votes
2 answers

Bash 'printf' equivalent for command prompt?

I'm looking to pipe some String input to a small C program in Windows's command prompt. In bash I could use $ printf "AAAAA\x86\x08\x04\xed" | ./program Essentially, I need something to escape those hexadecimal numbers in command prompt. Is there…
Calum Murray
  • 1,102
  • 3
  • 12
  • 20
8
votes
1 answer

return to libc - problem

I'm having problems with return-to-libc exploit. The problem is that nothing happens, but no segmentation fault (and yes I'm actually overflowing the stack). This is my program: int main(int argc, char **argv) { char array[512]; …
eleanor
  • 1,514
  • 3
  • 19
  • 40
8
votes
4 answers

My php site was hacked by codes uploaded as image..?

Yesterday my site was comprised. The attacker changes the index.php file to their own (with all their glory messages and greet). I've notified the hosting company about this (we are running on a dedicated server), and on my part, I'm trying to fix…
imin
  • 4,504
  • 13
  • 56
  • 103
8
votes
1 answer

Is it safe to expose java remote debugger port to the internet?

I was going to expose a port for remote debugging of Java-based web service over the internet, but thinking twice I realised that it has no any authentification. Theoretically, it seems to be possible to write a tool, that attaches to remote…
Dmitriusan
  • 11,525
  • 3
  • 38
  • 38
8
votes
3 answers

Stack Overflow Exploit in C

The question is actually about stack overflows in C. I have an assigment that I can not get done for the life of me, I've looked at everything in the gdb and I just cant figure it. The question is the following: int i,n; void confused() { …
Fernando Gonzalez
8
votes
6 answers

How to write a buffer-overflow exploit in GCC,windows XP,x86?

void function(int a, int b, int c) { char buffer1[5]; char buffer2[10]; int *ret; ret = buffer1 + 12; (*ret) += 8;//why is it 8?? } void main() { int x; x = 0; function(1,2,3); x = 1; printf("%d\n",x); } The above demo…
Mask
  • 33,129
  • 48
  • 101
  • 125
8
votes
3 answers

Using a Single system() Call to Execute Multiple Commands in C

In an information security lab I'm working on, I've been tasked with executing multiple commands with a single call to "system()" (written in C, running on Fedora). What is the syntax that will allow me to execute more than command through…
Chance
  • 988
  • 2
  • 13
  • 29
8
votes
2 answers

Overwrite return address simple format string exploit

Yes, quite a few similar questions exist already (5037601, 19166698, 4855162, 14505995, 5052648, 13409508, 7745146, 7459630; sorry, not enough rep for more than 2 links), and yes, there are some nice articles explaining this kind of thing (click,…
Bla Blaat
  • 143
  • 1
  • 1
  • 7
1 2
3
52 53