Questions tagged [exploit]

An exploit is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch, or vulnerability in order to cause unintended or unanticipated behavior to occur. This frequently includes such things as gaining control of a computer system, allowing privilege escalation, or a denial of service attack.

790 questions
-1
votes
3 answers

Using an exploit as a feature. Should I allow that?

If a user wants a feature, the feature request is a low priority, but the user finds and exploits a bug allowing to get to the same result as if the feature was present, what should I do as a developer ? Should I fix the bug (and lose a "feature")…
Philippe Carriere
  • 3,712
  • 4
  • 25
  • 46
-1
votes
1 answer

Heap Spray Internet Explorer 8

I want to know, is there a way to spray IE8 heap? I did my best but I was not able to spray IE 8 heap! I attached Olly to IE and I never see my data in Memory of IE. How can I do that? I also used Heaplib, but again no luck! Any advice? Is it…
XPACK
-1
votes
2 answers

un-exploitable php functions (whitelist)

Does anyone have a prepared whitelist of as many as possible secure / unexploitable PHP functions? I am building a web application where user enters the Smarty template (Smarty version 3). Application runs this template through Smarty (with proper…
johndodo
  • 17,247
  • 15
  • 96
  • 113
-2
votes
0 answers

pls am trying to rebuild my application using apktool but i keep running into one specific error, pls help anyone....id be grateful

pls am trying to rebuild my application using apktool but i keep running into one specific error, pls help anyone....id be grateful apktool b /root/Ping1 I: Using Apktool 2.8.1 I: Checking whether sources has changed... I: Smaling smali folder into…
-2
votes
1 answer

Buffer overflow with pointer issue

I am trying to figure out this buffer overflow exploit. Any pointer would be helpful. #include #include #include typedef struct node_t { int x; char y; float z; } node_p; void unsafe() { …
-2
votes
1 answer

Acces a broken screen android phone with PC

is there a way to recover some pictures inside my phone ? (2 phones actually, Galaxy A5 and A50) -the screen is broken -i tried ADB, but device unauthorized
-2
votes
1 answer

in which programming languages ​are there wrappers?

I have been studying the lfi web vulnerability and I have seen that there are wrappers in php, which are mostly used to exploit said vulnerability. My question is the wrappers only exist in php?
-2
votes
1 answer

Integer Overflow Exploit

I have this code, which have some vulnerability, but I can't seem to exploit it. For now, this is what I've noticed: 1) if argv[1] = 3 and argc = 3, then it overflows and writes argv[2] into memory of array[3] in "place_int_array" function. 2) if…
Elyasaf755
  • 2,239
  • 18
  • 24
-2
votes
1 answer

Kernel space memory layout

How is kernel space sections? and how do they locate? For example, user space has some sections (.data, .text, stack ...). I want to know kernel space's memory layout image. Please tell me it or related site.
DARUMA
  • 3
  • 3
-2
votes
1 answer

Hacking & Seucrity : suscribe CMS & framework upgrades

In my daily life I work on multiple websites : some were developed from scratch, others are running frameworks like Jquery, CMS like Symfony/Wordpress/TYPO3 etc... On a regular basis I go to the official vendors websites to check if any new version…
Paolito75
  • 558
  • 1
  • 11
  • 33
-2
votes
1 answer

Cant exploit overflow in simple program (chapter2 shellcoder's handbook)

I am reading The shellcoder's Handbook and im currently at chapter 2 where i have a simple program to exploit by overflowing the expected input and then issuing a new location for the ret instruction so that the function return_input can be executed…
Nikolay Atanasov
  • 215
  • 2
  • 12
-2
votes
2 answers

asprintf function in C, what does it do?

I'm currently doing the Exploit-Exercises on level02 where in script I see a function called 'asprintf',asprintf(&buffer, "/bin/echo %s is cool" , getenv("USER")); buffer = null; before this function call. Please explain to me in plain english what…
DELETE_ME
  • 11
  • 1
  • 3
-2
votes
1 answer

Where can I find the full contents of the iOS root (/) directory?

I am an exploit developer/penetration tester for Maroon Penetration Testing based in Oklahoma (private organization) and I am currently looking for vulnerabilities in iOS, but I would either need the source code of iOS or the system files (root or /…
noodles
  • 25
  • 5
-2
votes
1 answer

Exploiting fopen when input has extension appended

For science. Say I have the following code:
Benny Mose
  • 694
  • 1
  • 8
  • 15
-2
votes
1 answer

Making new SQL Statment without canceling current one

Is there some way to completely change the SQL statement while writing it: Let's say I have this: SELECT * from `table1` WHERE `column1` LIKE '%%' But now I decide I actually want to SELECT something completely different, like table2 e.g., could I…
hgiesel
  • 5,430
  • 2
  • 29
  • 56