Skip to main content
1 vote
1 answer
151 views

I am trying to learn about buffer overflows and getting a root shell. So the code essentially checks the file extension. There is purposely a bug as the strcpy function doesn't check the size before ...
Alexander Rhoades's user avatar
7 votes
1 answer
223 views

Trying to reproduce buffer overflow on Ubuntu 24 for learning purposes. So the goal is to call call_me_twice second time by passing its address into input string. $ cat bof.c #include <stdio.h> ...
Slimboy Fat's user avatar
2 votes
1 answer
257 views

This comes from a post about invoking a trivial buffer overflow (to jump to a function present in the source but not called explicitly in any place of the program (2333909/how-can-i-invoke-buffer-...
nostromo's user avatar
  • 447
1 vote
0 answers
29 views

I am trying to run FreeRTOS on my stm32f407 discovery board. I am using segger system view continuous recording via j-link. The problem I am facing is that when I run this code: status = xTaskCreate(...
Rizwan Ahmad's user avatar
4 votes
1 answer
233 views

I made a simple vulnerable program greet.c: #include <stdio.h> #include <string.h> int main (int argc, char **argv) { char buf[32]; strcpy(buf, argv[1]); printf("%s\n"...
AISK's user avatar
  • 65
4 votes
1 answer
195 views

I am currently trying to make a code more safe for a cybersecurity exercise. I was asked to make the flag contained in the secret_function() come out. The problem is that I can't modify the code and ...
Tempest_Sword's user avatar
0 votes
0 answers
115 views

In the code below when I try to overwrite the stack by exploiting the buffer overflow in the line below. memcpy(&local_1d,*(void **)local_10[1],(ulong)*(uint *)(local_10[1] + 8)); I also ...
AES's user avatar
  • 17
0 votes
1 answer
121 views

Sorry if this is the wrong format. Im currently doing a CTF and have a problem where i have to overflow a buffer, to get access to a /bin/sh hidden function, where i then can get a flag. I think i ...
Egelund48's user avatar
1 vote
2 answers
90 views

I came across this page here when looking for buffer overflow examples: https://learn.microsoft.com/en-us/cpp/sanitizers/error-heap-buffer-overflow?view=msvc-170 In this, they mention this code as an ...
user185543's user avatar
2 votes
1 answer
333 views

Here's a revised and well-structured Stack Overflow post incorporating all necessary improvements: Buffer Overflow Exploit (x86-64, Attack Lab Phase 2) - Injecting Shellcode for Function Call ...
Toan Lam's user avatar
  • 139
0 votes
0 answers
25 views

\`#include \<iostream\> #include \<cstring\> void secretFunction() { std::cout \<\< " Exploit Successful! You've gained control! " \<\< std::endl; } void ...
user29808270's user avatar
2 votes
0 answers
171 views

Veracode reported: This call to ReadFile() contains a potential buffer overflow. The specified size of 92 bytes is larger than the space allocated to the destination buffer (88 bytes). The code: ...
isobretatel's user avatar
  • 3,968
0 votes
1 answer
223 views

I am learning about heap overflow attacks, but I am encountering a problem. Based on the knowledge I found online and my own guesses, I believe that a heap overflow attack involves overwriting ...
ho tian's user avatar
  • 35
2 votes
0 answers
143 views

I am following a walkthrough of a box on VulnHub, The Planets: Venus. I got the shell to run through a buffer overflow, by putting an 8 byte padding, a gadget(pop rdi; ret), an address pointing to &...
DeceptiveRat's user avatar
1 vote
1 answer
148 views

I have a very strange code, which as far as I understand, replaces the return address of the function b, and thus the function f is called from it. But I do not quite understand why after the function ...
Oliver's user avatar
  • 21

15 30 50 per page
1
2 3 4 5
103