An exploit is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch, or vulnerability in order to cause unintended or unanticipated behavior to occur. This frequently includes such things as gaining control of a computer system, allowing privilege escalation, or a denial of service attack.
Questions tagged [exploit]
790 questions
-1
votes
3 answers
Using an exploit as a feature. Should I allow that?
If a user wants a feature, the feature request is a low priority, but the user finds and exploits a bug allowing to get to the same result as if the feature was present, what should I do as a developer ? Should I fix the bug (and lose a "feature")…

Philippe Carriere
- 3,712
- 4
- 25
- 46
-1
votes
1 answer
Heap Spray Internet Explorer 8
I want to know, is there a way to spray IE8 heap?
I did my best but I was not able to spray IE 8 heap! I attached Olly to IE and I never see my data in Memory of IE.
How can I do that? I also used Heaplib, but again no luck!
Any advice? Is it…
XPACK
-1
votes
2 answers
un-exploitable php functions (whitelist)
Does anyone have a prepared whitelist of as many as possible secure / unexploitable PHP functions?
I am building a web application where user enters the Smarty template (Smarty version 3). Application runs this template through Smarty (with proper…

johndodo
- 17,247
- 15
- 96
- 113
-2
votes
0 answers
pls am trying to rebuild my application using apktool but i keep running into one specific error, pls help anyone....id be grateful
pls am trying to rebuild my application using apktool but i keep running into one specific error, pls help anyone....id be grateful
apktool b /root/Ping1
I: Using Apktool 2.8.1
I: Checking whether sources has changed...
I: Smaling smali folder into…
-2
votes
1 answer
Buffer overflow with pointer issue
I am trying to figure out this buffer overflow exploit. Any pointer would be helpful.
#include
#include
#include
typedef struct node_t {
int x;
char y;
float z;
} node_p;
void unsafe() {
…

Iconik Omrondo
- 1
- 2
-2
votes
1 answer
Acces a broken screen android phone with PC
is there a way to recover some pictures inside my phone ?
(2 phones actually, Galaxy A5 and A50)
-the screen is broken
-i tried ADB, but device unauthorized

Alex Rudes
- 1
- 1
-2
votes
1 answer
in which programming languages are there wrappers?
I have been studying the lfi web vulnerability and I have seen that there are wrappers in php, which are mostly used to exploit said vulnerability. My question is the wrappers only exist in php?
-2
votes
1 answer
Integer Overflow Exploit
I have this code, which have some vulnerability, but I can't seem to exploit it.
For now, this is what I've noticed:
1) if argv[1] = 3 and argc = 3, then it overflows and writes argv[2] into memory of array[3] in "place_int_array" function.
2) if…

Elyasaf755
- 2,239
- 18
- 24
-2
votes
1 answer
Kernel space memory layout
How is kernel space sections? and how do they locate?
For example, user space has some sections (.data, .text, stack ...).
I want to know kernel space's memory layout image.
Please tell me it or related site.

DARUMA
- 3
- 3
-2
votes
1 answer
Hacking & Seucrity : suscribe CMS & framework upgrades
In my daily life I work on multiple websites : some were developed from scratch, others are running frameworks like Jquery, CMS like Symfony/Wordpress/TYPO3 etc...
On a regular basis I go to the official vendors websites to check if any new version…

Paolito75
- 558
- 1
- 11
- 33
-2
votes
1 answer
Cant exploit overflow in simple program (chapter2 shellcoder's handbook)
I am reading The shellcoder's Handbook and im currently at chapter 2 where i have a simple program to exploit by overflowing the expected input and then issuing a new location for the ret instruction so that the function return_input can be executed…

Nikolay Atanasov
- 215
- 2
- 12
-2
votes
2 answers
asprintf function in C, what does it do?
I'm currently doing the Exploit-Exercises on level02 where in script I see a function called 'asprintf',asprintf(&buffer, "/bin/echo %s is cool" , getenv("USER")); buffer = null; before this function call.
Please explain to me in plain english what…

DELETE_ME
- 11
- 1
- 3
-2
votes
1 answer
Where can I find the full contents of the iOS root (/) directory?
I am an exploit developer/penetration tester for Maroon Penetration Testing based in Oklahoma (private organization) and I am currently looking for vulnerabilities in iOS, but I would either need the source code of iOS or the system files (root or /…

noodles
- 25
- 5
-2
votes
1 answer
Exploiting fopen when input has extension appended
For science.
Say I have the following code:

Benny Mose
- 694
- 1
- 8
- 15
-2
votes
1 answer
Making new SQL Statment without canceling current one
Is there some way to completely change the SQL statement while writing it:
Let's say I have this:
SELECT * from `table1` WHERE `column1` LIKE '%%'
But now I decide I actually want to SELECT something completely different, like table2 e.g., could I…

hgiesel
- 5,430
- 2
- 29
- 56