Skip to main content
Filter by
Sorted by
Tagged with
2 votes
1 answer
248 views

This comes from a post about invoking a trivial buffer overflow (to jump to a function present in the source but not called explicitly in any place of the program (2333909/how-can-i-invoke-buffer-...
nostromo's user avatar
  • 421
4 votes
1 answer
191 views

I made a simple vulnerable program greet.c: #include <stdio.h> #include <string.h> int main (int argc, char **argv) { char buf[32]; strcpy(buf, argv[1]); printf("%s\n"...
AISK's user avatar
  • 65
0 votes
0 answers
115 views

In the code below when I try to overwrite the stack by exploiting the buffer overflow in the line below. memcpy(&local_1d,*(void **)local_10[1],(ulong)*(uint *)(local_10[1] + 8)); I also ...
AES's user avatar
  • 17
1 vote
2 answers
89 views

I came across this page here when looking for buffer overflow examples: https://learn.microsoft.com/en-us/cpp/sanitizers/error-heap-buffer-overflow?view=msvc-170 In this, they mention this code as an ...
user185543's user avatar
0 votes
0 answers
25 views

\`#include \<iostream\> #include \<cstring\> void secretFunction() { std::cout \<\< " Exploit Successful! You've gained control! " \<\< std::endl; } void ...
user29808270's user avatar
0 votes
1 answer
205 views

I am learning about heap overflow attacks, but I am encountering a problem. Based on the knowledge I found online and my own guesses, I believe that a heap overflow attack involves overwriting ...
ho tian's user avatar
  • 35
2 votes
0 answers
102 views

I am following a walkthrough of a box on VulnHub, The Planets: Venus. I got the shell to run through a buffer overflow, by putting an 8 byte padding, a gadget(pop rdi; ret), an address pointing to &...
DeceptiveRat's user avatar
0 votes
2 answers
67 views

I wrote this function that should write a structure of data into a buffer of bytes then returns how many have been written. The function does the following: ask as input a buffer of bytes (char *), ...
magg's user avatar
  • 65
0 votes
0 answers
145 views

To exploit the buffer overflow vulnerability in a challenge program, I need to craft a payload that satisfies a palindrome check and executes arbitrary code. This requires creating a palindromic ...
user27263189's user avatar
2 votes
2 answers
887 views

I am trying to test this example from StackOverflow (how-can-i-invoke-buffer-overflow), but I am not having success. I also asked for clarification two weeks ago, directly on the post (through a ...
nostromo's user avatar
  • 421
1 vote
1 answer
679 views

I'm currently exploring stack frames and how they work in C programs, specifically on unprotected 32-bit x86 systems (no ASLR, stack canaries, or DEP). I'm not primarily a CS Student — I'm a physics ...
Jonas's user avatar
  • 11
2 votes
0 answers
153 views

The attack target The attack target is a C program which uses a doubly linked list: #include <stdio.h> #include <string.h> #include <stdlib.h> typedef struct node { struct node *...
Patrick's user avatar
  • 147
1 vote
0 answers
678 views

I am a total beginner in CTF challenges (and not much of an expert in programming in general if I'm being honest) and I've been playing around with gerasdf's InsecureProgramming exercises as a way to ...
aitatata's user avatar
-1 votes
3 answers
165 views

#include <stdio.h> int main(int argc, char *argv[]) { int arr[5] = {1, 2, 3, 4, 5}; arr[6] = 7; // [1, 2, 3, 4, 5, 6] printf("arr[6] = %d\n", arr[6]); return 0; }...
Kwang-min Kim's user avatar
0 votes
1 answer
78 views

I have a vba automation to concatenate some text but it's been giving me the "Overflow" error when changing the result to date in this specific file (works fine in others). Function ...
user16201107's user avatar
3 votes
1 answer
43 views

With gcc version 13.2.0 (Ubuntu 13.2.0-23ubuntu4) the following code compiles OK: char mm[3]; sprintf (mm, "%02d", date_struct->tm_mon); // tm_mon is from 0 to 11 How does gcc know that ...
malaise's user avatar
  • 99
0 votes
1 answer
63 views

I was solving a question on Leetcode(322. Coin Change) and I wrote my solution which is working on VScode. the code is: int coinChange(vector<int>& coins, int amount) { int n = coins.size(...
Ankur Yadav's user avatar
0 votes
0 answers
50 views

The basic logic in this problem is that the program scans over a directory for N times, and does some operation on specific file inside. The bug comes out as: program employs rewinddir() to put the ...
Yuming_J's user avatar
2 votes
1 answer
71 views

I'm trying to transform an image into a matrix of it's rbg values in c++, i really like the simplicity of PIL on handling different images extensions, so i currently have two codes from PIL import ...
Leonardo Dantas's user avatar
1 vote
0 answers
59 views

I'm a student trying to solve an exercise for my cybersecurity course. It's the first time I get in contact with buffer overflows, gdb and so on, so not a lot of experience here. I was given a simple ...
rotkehlchen55's user avatar
0 votes
1 answer
91 views

I am currently playing around with some exploitation techniques in 64-bit Intel executable. My program was compiled with canary protection disabled (-fno-stack-protector), buffer overflow error ...
Anh Phan's user avatar
2 votes
1 answer
827 views

My goal is to buffer-overflow a binary written in C. That binary asks me to input a name. After having opened the binary with Ghidra, I discovered the following code that should help me to build an ...
Julien's user avatar
  • 629
0 votes
1 answer
146 views

For demonstration / educational purposes I want to write a simple proof of concept application which uses a buffer overflow to execute code from within this app which is not called normally. I thought ...
Flavio's user avatar
  • 1
0 votes
3 answers
361 views

#include <stdio.h> int main(void){ int len; char input[40]=""; printf("input length : \n"); scanf("%d", &len); if(len > 40){ return 0; } ...
tiahsl's user avatar
  • 3
-1 votes
1 answer
121 views

I am trying to simulate buffer overflow on my mac, but it keeps getting segmentation fault even with -fno-stack-protector. Below is the output I get. Vulnerable function executed! data:...
Ryu Hyunsun's user avatar

1
2 3 4 5
31