Skip to main content

All Questions

2votes
0answers
154views

How to do a bufferoverflow attack for a simple C program?

Consider the following simple C program that asks the user for to input their user name and password in order to get access to some website. (The correct username is supposed to be "admin" ...
3nondatur's user avatar
20votes
6answers
11kviews

Do high level languages allow for buffer / heap overflow?

I'm learning about basic x86 overflows in C but normally I code with Python. Is there anyway that programs written in higher level languages can suffer from buffer/heap overflow?
blank's user avatar
0votes
1answer
667views

Understanding why this buffer overflow attack isn't working

I'm doing a buffer overflow challenge, and I can't understand what exactly I'm doing wrong. Through debugging, I managed to figure out how my input should look like such that I can force the program ...
Ayumu Kasugano's user avatar
4votes
1answer
2kviews

Buffer overflow attack, executing an uncalled function

So, I'm trying to exploit this program that has a buffer overflow vulnerability to get/return a secret behind a locked .txt (read_secret()). vulnerable.c //no edits here #include <stdlib.h> #...
thefalsehuman's user avatar
1vote
1answer
468views

Developing MIPS exploit in python memory address getting parse as a value [closed]

I am trying to develop an exploit in python. but I am not able to write an proper exploit. Below are the scenarios were i am facing problem. below is the HTTP request which occurs the crash POST /cgi-...
Security Beast's user avatar
1vote
1answer
379views

Fuzzing: Quickly find the exact number of bytes

I'm currently practicing buffer overflow. And I have a question for you regarding fuzzing. I am able to develop a python script that will try several buffer sizes to crash an application. It works ...
3r4inZ's user avatar
-1votes
2answers
890views

Remote Bufferoverflow exploiting + writting exploit

My teacher give me some exercise about B.O to understand how buffer overflow works, and "how" write some exploit to prove it! He give me some programs in C, i can't solve the last. For the last, the ...
Murdoc's user avatar
1vote
0answers
2kviews

Performing denial of service attack using Python [closed]

I am a student so please don't be rude for I miss something and this project is for research purpose only. I am willing to perform a denial of service attack(on my own servers) I am not willing to do ...
VISWESWARAN NAGASIVAM's user avatar
3votes
2answers
16kviews

buffer overflow in python script

I am developing a script to perform an a buffer overflow for an assignment in school. However, I am stuck at a point where my payload works injected through the commandline, but not injected through ...
user1090614's user avatar
2votes
2answers
4kviews

Python exploit question?

Can someone please explain how and why this struct.pack code is used in the below exploit? I'm trying to understand how it triggers the vulnerability. I understand the buffer overflow aspect, I'm ...
nanotechz9l's user avatar
0votes
1answer
664views

Using buffer overflow on word with macro injection

I know how a buffer overflow works on a local network against an application running on a TCP port, assuming it doesn't drop the connection, but I would like some advice on an "exploit" I would like ...
KnightOfNi's user avatar

close