All Questions
Tagged with exploit-developmentreverse-engineering
5 questions
0votes
1answer
3kviews
What is source of bad characters exist in buffer overflows
I'm new to exploit development and while watching a tutorial I came across the topic of "Bad character identification". I'm referring to the process of sending all possible characters to the ...
1vote
0answers
546views
Android Exploit Development Lab [closed]
Looking to setup an exploit development environment to do the following: Fuzz Android libraries to find new vulnerabilities Re-create already existing bugs/vulnerabilities based on bug fixes found on ...
1vote
2answers
2kviews
Segmentation fault error when calling user defined function in shellcode
I am getting the segmentation fault error when I called function "target" in my shellcode. Here's the C code of program: #include <stdio.h> #include <stdlib.h> #include <unistd.h> #...
3votes
1answer
3kviews
Heap Overflow - unlink() technique exploitation on x86_64 (64 bit)
Trying to exploit this sample vulnerable program: /* Heap overflow vulnerable program. */ #include <stdlib.h> #include <string.h> int main( int argc, char * argv[] ) { char * ...
-4votes
3answers
443views
Reverse Engineer and Exploits researching [closed]
Can some one give me a start point for finding exploits in software and reverse engineering? I need some kind of a book or a site... I have background with programming with high and low level such as ...