An exploit is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch, or vulnerability in order to cause unintended or unanticipated behavior to occur. This frequently includes such things as gaining control of a computer system, allowing privilege escalation, or a denial of service attack.
Questions tagged [exploit]
790 questions
-2
votes
1 answer
I don't know why codes flow this way in gdb
I'm debugging the binary(vortex8). This program runs two threads using pthread_create() function. Assembly codes are below.
(gdb) 0xbffffa01 in ?? ()
(gdb) x/i 0xbffff9fd
0xbffff9fd: nop
0xbffff9fe: jmp 0xbffffa0d
0xbffffa00: pop …

장석인
- 5
- 3
-2
votes
2 answers
How to do Infinite Loop
My aim is to write an infinite loop. I have to print infinitely this string "Hello World %s" and I can just use ROP (Return-oriented programming).
gcc -fno-stack-protector loop.c -o loop
I can compile as shown. How can I do…

epoxxy
- 97
- 1
- 8
-2
votes
5 answers
What is this Base64 Look-alike?
I am new to decoding techniques and have just learnt about base64, sha-1, md5 and a few others yesterday.
I have been trying to figure out what "orkut" worms actually contain.
I was attacked by many orkut spammers and hackers in the past few days,…

N-J
- 25
- 1
- 3
-2
votes
1 answer
Learning sql inject
Currently I a learning about SQL injection, I attempted
test ="'); DROP TABLE users; '";
It drings up the error message
mysql_num_rows() expects parameter 1 to be resource, boolean given in C:\Program Files…

Jon Snow
- 123
- 2
- 11
-2
votes
2 answers
About Stack Buffer Overflow Exploits
I'm trying to learn how to write exploits for stack overflows by installing random apps from SourceForge and testing them with bad inputs.
I faced some programs where the app crashes but my input doesn't overwrite the EIP register... What should I…

user3396251
- 79
- 4
-2
votes
6 answers
Convert string to command
I'm trying to convert to get a command executed which is passed to the print statement. Eg:
print "exec(raw_input())"
Can I get to run the exec() in some way?

securecoding
- 2,763
- 2
- 15
- 14
-2
votes
1 answer
Is Google Chrome Vurnerable to Zero Day Java Exploit like IE?
I've seen IE 6 to 10 can be easaily exploited using the Zero Day Java Exploit (CVE-2013-0422)
And If the IE have been exploited.. We can access the hardisk file even cookies or password..
That's very dangerous
This is the screenshot
And Google…

dytra
- 164
- 2
- 12
-2
votes
3 answers
Is this PHP code exploitable?
Possible Duplicate:
Are mysql_real_escape_string() and mysql_escape_string() sufficient for app security?
So basically I have a qryName in the URL
eg: mysite.com/qryName=WHAT
if (isset($_GET['qryName']))
{
$qryName =…

Brooke Flame
- 31
- 3
-3
votes
1 answer
i need solution for brute force 6 digit otp,
suppose I need to implement a system to brute force a 6-digit OTP. I have 100 Core 2 Duo computers. Each computer has 1/2gb ram and a 20mbps Broadband connection, but OTPs expire within 300 seconds or 5 minutes. Now how can I successfully get OTP…

Shafkat Raihan
- 1
- 1
-3
votes
1 answer
Same MD5 hash value but different input using hash('md5')
I know that there is some case 2 different strings can have same MD5 hash but when I try with PHP it still become 2 different hash. So is there any string that have same MD5 hash in PHP if I use hash('md5', $blablabla)?

DŨNG ĐỖ
- 11
- 2
-3
votes
1 answer
Javascript hooking
If I wanted to hook calls to functions like eval and settimeout in Javascript to get things like the code eval is going to execute and through function settimeout is going to call, where would I start?
Scenario is, I go to a webpage in chrome and i…

geekscrap
- 965
- 2
- 12
- 26
-3
votes
1 answer
Exploiting without use of files
I have already read many articles about exploits and also tried to test some on my second PC. I know that the key of using exploits is to upload a payload to the victim which then gets executed (as the instruction pointer got manipulated)
My…

TheGuy13
- 21
- 1
- 6
-3
votes
1 answer
Can anyone explain this javascript exploit?
var a = ['document', 'window', String];
var b = '108 111 99 97 116 105 111 110';
var c = '%68%74%74%70%73%3a%2f%2f%77%77%77%2e%74%75%6d%62%6c%72%2e%63%6f%6d';
var d = 'ZnJvbUNoYXJDb2Rl';
var e = 'ZGVjb2RlVVJJQ29tcG9uZW50';
var f = '1c2o3n4s5o6l7e8',…

Pankaj Moolrajani
- 75
- 11
-3
votes
1 answer
Can you inject assembly code into an exe?
Computer security is a vast topic that I've avoided for a long time, assuming it was far too complex for my skill level.
I'm beginning to get a little curious, so I wonder, is it possible to just open up random exe files, (or any file for that…

bigcodeszzer
- 916
- 1
- 8
- 27
-3
votes
1 answer
Aleph one code - buffer overflow
I got this code of aleph one:
shellcode.h
#if defined(__i386__) && defined(__linux__)
#define NOP_SIZE 1
char nop[] = "\x90";
char shellcode[] =
"\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b"
…

Elad Doocker
- 197
- 11