Questions tagged [exploit]

An exploit is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch, or vulnerability in order to cause unintended or unanticipated behavior to occur. This frequently includes such things as gaining control of a computer system, allowing privilege escalation, or a denial of service attack.

790 questions
-2
votes
1 answer

I don't know why codes flow this way in gdb

I'm debugging the binary(vortex8). This program runs two threads using pthread_create() function. Assembly codes are below. (gdb) 0xbffffa01 in ?? () (gdb) x/i 0xbffff9fd 0xbffff9fd: nop 0xbffff9fe: jmp 0xbffffa0d 0xbffffa00: pop …
장석인
  • 5
  • 3
-2
votes
2 answers

How to do Infinite Loop

My aim is to write an infinite loop. I have to print infinitely this string "Hello World %s" and I can just use ROP (Return-oriented programming). gcc -fno-stack-protector loop.c -o loop I can compile as shown. How can I do…
epoxxy
  • 97
  • 1
  • 8
-2
votes
5 answers

What is this Base64 Look-alike?

I am new to decoding techniques and have just learnt about base64, sha-1, md5 and a few others yesterday. I have been trying to figure out what "orkut" worms actually contain. I was attacked by many orkut spammers and hackers in the past few days,…
N-J
  • 25
  • 1
  • 3
-2
votes
1 answer

Learning sql inject

Currently I a learning about SQL injection, I attempted test ="'); DROP TABLE users; '"; It drings up the error message mysql_num_rows() expects parameter 1 to be resource, boolean given in C:\Program Files…
Jon Snow
  • 123
  • 2
  • 11
-2
votes
2 answers

About Stack Buffer Overflow Exploits

I'm trying to learn how to write exploits for stack overflows by installing random apps from SourceForge and testing them with bad inputs. I faced some programs where the app crashes but my input doesn't overwrite the EIP register... What should I…
-2
votes
6 answers

Convert string to command

I'm trying to convert to get a command executed which is passed to the print statement. Eg: print "exec(raw_input())" Can I get to run the exec() in some way?
securecoding
  • 2,763
  • 2
  • 15
  • 14
-2
votes
1 answer

Is Google Chrome Vurnerable to Zero Day Java Exploit like IE?

I've seen IE 6 to 10 can be easaily exploited using the Zero Day Java Exploit (CVE-2013-0422) And If the IE have been exploited.. We can access the hardisk file even cookies or password.. That's very dangerous This is the screenshot And Google…
dytra
  • 164
  • 2
  • 12
-2
votes
3 answers

Is this PHP code exploitable?

Possible Duplicate: Are mysql_real_escape_string() and mysql_escape_string() sufficient for app security? So basically I have a qryName in the URL eg: mysite.com/qryName=WHAT if (isset($_GET['qryName'])) { $qryName =…
-3
votes
1 answer

i need solution for brute force 6 digit otp,

suppose I need to implement a system to brute force a 6-digit OTP. I have 100 Core 2 Duo computers. Each computer has 1/2gb ram and a 20mbps Broadband connection, but OTPs expire within 300 seconds or 5 minutes. Now how can I successfully get OTP…
-3
votes
1 answer

Same MD5 hash value but different input using hash('md5')

I know that there is some case 2 different strings can have same MD5 hash but when I try with PHP it still become 2 different hash. So is there any string that have same MD5 hash in PHP if I use hash('md5', $blablabla)?
-3
votes
1 answer

Javascript hooking

If I wanted to hook calls to functions like eval and settimeout in Javascript to get things like the code eval is going to execute and through function settimeout is going to call, where would I start? Scenario is, I go to a webpage in chrome and i…
geekscrap
  • 965
  • 2
  • 12
  • 26
-3
votes
1 answer

Exploiting without use of files

I have already read many articles about exploits and also tried to test some on my second PC. I know that the key of using exploits is to upload a payload to the victim which then gets executed (as the instruction pointer got manipulated) My…
TheGuy13
  • 21
  • 1
  • 6
-3
votes
1 answer

Can anyone explain this javascript exploit?

var a = ['document', 'window', String]; var b = '108 111 99 97 116 105 111 110'; var c = '%68%74%74%70%73%3a%2f%2f%77%77%77%2e%74%75%6d%62%6c%72%2e%63%6f%6d'; var d = 'ZnJvbUNoYXJDb2Rl'; var e = 'ZGVjb2RlVVJJQ29tcG9uZW50'; var f = '1c2o3n4s5o6l7e8',…
-3
votes
1 answer

Can you inject assembly code into an exe?

Computer security is a vast topic that I've avoided for a long time, assuming it was far too complex for my skill level. I'm beginning to get a little curious, so I wonder, is it possible to just open up random exe files, (or any file for that…
bigcodeszzer
  • 916
  • 1
  • 8
  • 27
-3
votes
1 answer

Aleph one code - buffer overflow

I got this code of aleph one: shellcode.h #if defined(__i386__) && defined(__linux__) #define NOP_SIZE 1 char nop[] = "\x90"; char shellcode[] = "\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b" …
Elad Doocker
  • 197
  • 11
1 2 3
52
53