Questions tagged [exploit]

An exploit is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch, or vulnerability in order to cause unintended or unanticipated behavior to occur. This frequently includes such things as gaining control of a computer system, allowing privilege escalation, or a denial of service attack.

790 questions
6
votes
1 answer

why will my buffer overflow exploit open a user shell only instead of a root shell?

I have been following a few tutorials on bufferoverflow exploitation. But my problem is, that I am not able to open a root shell, I will always get a normal user shell instead. I have checked the following points I re-verified the following items…
Zapho Oxx
  • 275
  • 1
  • 16
6
votes
1 answer

Why does fireshepard kill firesheep?

I presume there is a bug in the firesheep which fireshepard exploits. The responsible line might be in that weird string in cookie value for facebook. fireshepard source firesheep source
bbaja42
  • 2,099
  • 18
  • 34
6
votes
3 answers

Format string exploit ends in segfault

I'm reading now the "Hacking - The Art of Exploitation" book. This is my simplified version of a code for exploiting format-strings. /* fmt_vuln.c */ #include #include #include int main (int argc, char *argv[]){ …
mik mik
  • 139
  • 1
  • 5
6
votes
6 answers

Executing JavaScript from Flex: Is this javascript function dangerous?

I have a flex application that needs the ability to generate and execute JavaScript. When I say this, I mean I need to execute raw JavaScript that I create in my Flex application (not just an existing JavaScript method) I am currently doing this by…
mmattax
  • 27,172
  • 41
  • 116
  • 149
6
votes
4 answers

Trying to smash the stack

I am trying to reproduce the stackoverflow results that I read from Aleph One's article "smashing the stack for fun and profit"(can be found here:http://insecure.org/stf/smashstack.html). Trying to overwrite the return address doesn't seem to work…
Mike G
  • 4,829
  • 11
  • 47
  • 76
6
votes
1 answer

Return into libc - Illegal instruction

I am messing around with buffer overflows, particularly the return into libc kind. I have the following vulnerable code: #include #include main( int argc, char **argv) { char buffer[80]; getchar(); strcpy(buffer,…
F. P.
  • 5,018
  • 10
  • 55
  • 80
5
votes
3 answers

What exactly does this PHP exploit code (found on my app)?

I've found this code in base 64 on all php files of one of my client's site (wordpress) and I'm trying to understand what it does. I'm also trying to figure out if it was an application exploit or a direct FTP access that has past this…
Keyne Viana
  • 6,194
  • 2
  • 24
  • 55
5
votes
1 answer

Heap exploitation with Glibc 2.12.1

I've been searching with no good results. I wonder if the techniques explained in texts as Malloc Maleficarum or Malloc Des-Malleficarum are effective in glibc version 2.12.1. In the second mentioned text is said that the techniques are tested in…
newlog
  • 1,050
  • 1
  • 11
  • 23
5
votes
3 answers

Fuzzing command line arguments [argv]

I have a binary I've been trying to fuzz with AFL, the only thing is AFL only fuzzes STDIN, and File inputs and this binary takes input through its arguments pass_read [input1] [input2]. I was wondering if there are any methods/fuzzers that allow…
5
votes
1 answer

Is PHP immune to "HTTP Response Splitting" vulnerabilities?

alert(1)"); echo 1; But it turns out PHP automatically does the encoding: Set-Cookie: test=test%0D%0A%3Cscript%3Ealert%281%29%3C%2Fscript%3E Does that mean it's impossible to reproduce HTTP…
cpuer
  • 7,413
  • 14
  • 35
  • 39
5
votes
3 answers

Is this code an exploit? What is this code?

I'm looking at a site that has been exploited by someone/something. The site has had a bunch of links injected into it's footer that links to pharmaceutical pitches, and who knows what else. There are/were a lot of links right at the top of the…
rhaag71
  • 519
  • 7
  • 22
5
votes
0 answers

Hacked python server

I did a stupid thing. I started a local python server using sudo python3 -m http.server I was just gonna access some documents and turn it off but I forgot about it and left it running for 2 days. The server was running on a digital ocean instance…
user25470
  • 585
  • 4
  • 17
5
votes
1 answer

What is the difference between a buffer overflow attack and a ROP attack?

I started studying software security, and I'm having trouble getting what buffer overflow attack and ROP attack are. From what I understand is, Buffer overflow attack: When a buffer has a certain size, fill the buffer and an add additional code so…
yoon
  • 1,177
  • 2
  • 15
  • 28
5
votes
2 answers

Google Drive API -- get direct video download for different formats

It's known that by simply retrieving a Google API key that one can download any file (of any size) directly (and even embed a video to a website etc...), the problem is: when using the standard Google API URL in the form:…
5
votes
1 answer

CVE-2018-14667; generating a valid payload for RichFaces 3.X

I am currently running on a virtual machine JBoss 5.1.0GA + RichFaces 3.X + photoalbum demo which makes me vulnerable (only accessible from my LAN) to CVE-2018-14667. I have tested the payload mentioned in…
Gerald
  • 83
  • 8