An exploit is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch, or vulnerability in order to cause unintended or unanticipated behavior to occur. This frequently includes such things as gaining control of a computer system, allowing privilege escalation, or a denial of service attack.
Questions tagged [exploit]
790 questions
4
votes
2 answers
Sanitizing MySQL user parameters
What are the dangerous characters that should be replaced in user input when the users' input will be inserted in a MySQL query? I know about quotes, double quotes, \r and \n. Are there others?(I don't have the option of using a smart connector that…

Tom
- 6,991
- 13
- 60
- 78
4
votes
5 answers
Detecting exploits in web applications and how to proceed
What ways are there for detecting exploits in PHP/MySQL web applications (checking for certain characters or pieces of codes in the GET, POST, COOKIE arrays / using a library with a database that has all the patterns for common exploits, if any…

TheMagician
- 1,846
- 7
- 20
- 26
4
votes
1 answer
What are the "missing" spaces on the stack used for?
I have this function:
int vulnerableFunc(char *input)
{
char buffer[256];
memcpy(buffer, input, 1024);
return 1;
}
When I call it with 2000 "A" and dissassemble it with ollydbg on a 32 bit windows XP machine, I get the following…

user962460
- 153
- 1
- 8
4
votes
2 answers
Hacking - The Art of Exploitation: debugging buffer overflow example
I'm reading the book "Hacking - The Art of Exploitation".
There is an example on a stack buffer overflow.
This is a part of the source of the attacked program, "notesearch":
char searchstring[100];
// ...
if(argc > 1)
…

Harry
- 1,105
- 8
- 20
4
votes
1 answer
Why "ulimit -s unlimited" can de-ASLR in overflow?
I know the ulimit -s unlimited trick (to fix the address of libc) but i dont understand the fact behind,anyone could help me to make a explanation?~
thx

user2579274
- 279
- 1
- 5
- 11
4
votes
2 answers
execle() also specifies the environment. What does that mean?
I am reading a book called "Hacking: The art of exploitation" and I came across this paragraph:
With execl(), the existing environment is used, but if you use execle(),
the entire environment can be specified. If the environment array is just…

matanc1
- 6,525
- 6
- 37
- 57
4
votes
2 answers
Blackhole Exploit / Javascript
my site got infected by the well known blackhole exploit.
After some days and some help scripts i guess i fixed it now.
I'm wondering what this exploit…

lufi
- 610
- 7
- 29
4
votes
1 answer
Return To Libc with Null byte in the addr
I am trying to perform a return to libc format string attack, but the address I want to write to ( 0x0804a000) has a null byte in it!! I have to read in my format string to snprintf so the null byte causes it to malfunction and Segfaults randomly.…

user1455332
- 121
- 7
4
votes
1 answer
Trapping Bad Behavior with rewrite -phpmyadmin anywhere in URL
I'm hoping someone can help as I'm a bit of a noob when it comes to apache mod rewrite, and getting this one wrong can screw things up pretty bad.
While going though my security logs I noticed that almost 50% of the attacker bots had
the string…

user1887194
- 45
- 4
3
votes
2 answers
Windows console application with gets() ROP exploit
I'm trying (for learning purposes) to take advantage of gets() function vulnerability using return-oriented programming (ROP) technique. The target program is a Windows console application that in some point asks for some input, and then uses gets()…

Alex Lipov
- 13,503
- 5
- 64
- 87
3
votes
1 answer
Understanding metasploits meterpreter payload
I would like to get more in-depth knowledge of how the meterpreter works. If you disassemble the payload windows/meterpreter/reverse_typ, created by msfpayload with the following commands:
$ msfpayload windows/meterpreter/reverse_tcp…

Erik
- 11,944
- 18
- 87
- 126
3
votes
0 answers
Security: How come we still hear about many stack execution security flaws?
Security: How come we still hear about many stack execution security flaws even though mechanisms such as NX bit DEP and ASLR exist so many years ?
Have hackers found ways to circumvent these ?
When looking through relatively recent fixed security…

thedrs
- 1,412
- 12
- 29
3
votes
1 answer
Java - How is dynamic jar loading exploitable?
I'm working on a closed source java app that analyzes JAR files.
Since java can be easily decompiled, and obfuscation really isn't a big deal,
I want to provide an online service that will execute the app on my server and
return it's result much…

YLivay
- 125
- 1
- 8
3
votes
1 answer
PHP code in .gif exploit
I need to know how to generate a GIF with php code inside, or how to modify a gif to add this so that I can perform a test on our avatar upload plugin in wordpress - I just want to ensure it is secure. Or if someone has a test image already, which I…

Chris
- 2,340
- 6
- 40
- 63
3
votes
3 answers
Vulnerability & Exploit Case Studies
I understand the general idea of how vulnerabilities are exploited. Buffer overflows and stuff like that, but I guess I don't REALLY get it.
Are there useful sources of information that explain this area well? Maybe case studies about how…

carrier
- 32,209
- 23
- 76
- 99