Skip to main content

Questions tagged [buffer-overflow]

A classical programming bug that may lead to a possible security flaw in software. Exploitation of this bug is usually taking place either in the stack or in the heap.

Filter by
Sorted by
Tagged with
1 vote
1 answer
228 views

I'm trying to exploit a buffer overflow vulnerability in an ARM64 program from this blog. When I give as input 100*'A', and I compile the program for ARM 32 bit (without canaries), the program crashes ...
alond22's user avatar
  • 113
1 vote
3 answers
213 views

I'm reading the famous "Smash the stack and profit" paper, and to reiterate, the whole point of the idea is to put some binary code in a buffer, overflows it to rewrite the return address (...
Nicholas Humphrey's user avatar
4 votes
1 answer
175 views

I found a couple of interesting integer underflows leading to memcpy() wild copies in a TLV parser process of some random IoT firmware. It is 32-bit ARMv7. I'm able to emulate the userspace process ...
Attila Szász's user avatar
2 votes
0 answers
245 views

I am trying to understand how to overwrite the Global Offset Table. On the book "Hacking: The Art of Exploitation". Following the example I get: objdump -R ./fmt ...
LianoQ's user avatar
  • 31
2 votes
0 answers
86 views

I'm attempting to do a buffer overflow with gets(). I've figured out how to write over the return address and I'm able to do so, however, I cannot write in the address I need because the 0x7F at the ...
user42774's user avatar
3 votes
0 answers
62 views

I am playing with buffer overflow attacks in C. I have the following code: int foo(void*, void*); // Calculates the distance (in bytes) between two addresses in memory int main(int argc, char**...
Stone Paul's user avatar
3 votes
0 answers
172 views

I am new to buffer overflows and I was trying to overwrite the saved RIP to point to a buffer containing a shellcode. The buffer is located onto the stack so its address is randomized. How can I leak ...
Jacob's user avatar
  • 51
2 votes
0 answers
107 views

I have an executable vulnerable to buffer overflows. The program takes a buffer of 104 chars and prints it (unfortunately, there is no format string vulnerability) until we feed it with a 0 or a \n, ...
Jacob's user avatar
  • 51
3 votes
0 answers
55 views

I have stackoverflow in MIPS arch (without ASLR/canary) In Ida I see that the buffer that has the overflow located in SP+200 In the beginning if function I can see the stack size because I see the ...
Kokomelom's user avatar
  • 291
1 vote
1 answer
143 views

I have a 845 g7 with a bios 1.06, which has a load of CVEs which allow SMM and DXE exploits: https://support.hp.com/ca-en/drivers/selfservice/hp-elitebook-845-g7-notebook-pc/37506818 (under the UEFI ...
s33ds's user avatar
  • 13
1 vote
1 answer
2k views

I was reading this article by Hackers Grimoire on Windows buffer overflow attacks. The article made sense, except for the part where the author searched for a DLL (.dll) file which contained a JMP ESP ...
securityauditor's user avatar
1 vote
0 answers
250 views

I'm learning C and trying to understand how things like buffer overflows and other memory issues work. I am doing this on Windows for convenience reasons but would have no problem doing it on WSL or a ...
ChickenOverlord's user avatar
0 votes
0 answers
783 views

I work on a online program in which I should do a buffer Overflow. When I run the program, I have to complete a sum of two numbers generated randomly) : >>> 451389913 + 1587598959 = If I put ...
Julien's user avatar
  • 101
1 vote
0 answers
784 views

I'm doing a small exploit exercise. For this purpose, I have the following file: #include <stdio.h> void secretFunction() { printf("Congratulations!\n"); printf("...
Grazosi's user avatar
  • 111
0 votes
1 answer
5k views

I'm an absolute newbie when it comes to all this side of reverse engineering. Each time I try and understand it, I get lost almost immediately. I am trying a lab. I open it up in Binary Ninja. I get ...
pee2pee's user avatar
  • 221
1 vote
1 answer
548 views

Let's say I have a function (vuln) that has a local buffer with size of 0x20 bytes. In the beginning of this function, there is push r4-r7,lr. Is that correct, that the stack looks like: Buffer: (0x20)...
Buflow's user avatar
  • 11
0 votes
1 answer
447 views

I am trying to exploit this program test with ret2libc. Only NX is enabled. #include <stdio.h> void vuln() { char buffer[256]; gets(buffer); } int main() { vuln(); return 0; } ...
Mr Krisey's user avatar
2 votes
2 answers
8k views

I'm new to reverse engineering C binaries but have been working on an old ctf and thought to ask for explanation of specific assembly commands and how a buffer overflow might force a function to be ...
JFreeman's user avatar
  • 123
1 vote
0 answers
200 views

#include<stdio.h> #include<stdint.h> char shellcode[] = "\xb8\x3c\x00\x00\x00" "\xbf\x14\x00\x00\x00" "\x0f\x05"; int ...
user8166560's user avatar
2 votes
0 answers
201 views

I am trying to exploit a program with a buffer overflow for a class. The program has a canary enabled and when you smash the stack it exits. When running the program in gdb you can set a breakpoint ...
DCOanlyst's user avatar
0 votes
1 answer
98 views

Full disclosure: I am seeking help to complete a college assignment. I am seeking help on steps where I am stuck and unable to move forward, not a ready made answer. I need to exploit it to get a ...
Sid Swamy's user avatar
1 vote
2 answers
505 views

I am trying to run ltrace on this file: ./launcher: ELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux.so.2, for GNU/Linux 2.6.32, BuildID[sha1]...
Peter Stenger's user avatar
0 votes
1 answer
1k views

I am working with a binary that involves a buffer overflow on two contiguous memory blocks allocated with malloc. The binary filles up the first buffer with whatever the user inputs and hardcodes the ...
Ronald Rivera's user avatar
0 votes
0 answers
741 views

I am working with a crackmes binary called Simple Overflow. It has two buffers with sizes 0x10 and 0x8, and it uses malloc to allocate two contiguous memory blocks (see <+25> and <+39> on ...
Ronald Rivera's user avatar
2 votes
2 answers
515 views

In the sourcecode i can clearly see that the Array called "buf" is 32 byte long since 1 char = 1 byte I assume that the array starts at the address [rbp-0x30] and the argv[ ] is stored in ...
Fluctuation23's user avatar
2 votes
3 answers
1k views

I have found a stack buffer overflow. Currently, this is the situation: NX/DEP disabled ASLR enabled Not a PIE I am able to override the return address and jump to PLT sections. My problem is that I ...
alpico's user avatar
  • 21
1 vote
1 answer
218 views

In Ida pseudo-code when I press at stack's variable I can see the place of this variable in stack. char buffer[XXX]; // [sp+YYh] How can I get that information (buffer size and place of this buffer ...
func's user avatar
  • 43
1 vote
1 answer
5k views

Recently, I've been trying to learn how to use the pwntools library. I am trying to exploit the following program using pwntools: #include <stdio.h> #include <stdlib.h> int main(void) { ...
TigerThePredator's user avatar
0 votes
1 answer
237 views

I was wondering if there is some way to get information about buffer size via reversing the binary, created in C language. can we also know how many buffers we have created while writing that script. ...
lucky thandel's user avatar
0 votes
1 answer
593 views

Protostar I was doing the protostar format string (3rd challenge). where we have to change the value of a variable target with format string buffer overflow. so, I came up to this medium article: ...
lucky thandel's user avatar
1 vote
1 answer
910 views

I'm working inside a Warzone VM with no ALSR or NX bit. The program I'm trying to exploit is really simple: #include <stdlib.h> #include <stdio.h> #include <string.h> /* * compiled ...
smbullet's user avatar
  • 113
1 vote
1 answer
2k views

I have been working on finding an overflow in WordPad and I was able to run an exception with an undefined behavior (my point of view). I am using x64dbg (I am not a pro x64dbg) and it shows ...
Ahmed Can Unbay's user avatar
1 vote
0 answers
186 views

I have a question, I have a device that i can perform on it buffer overflow. The problem is that is that there is an ASLR(on all addresses in /proc/binary/maps, but not on the binary itself, but all ...
Logan's user avatar
  • 71
0 votes
0 answers
352 views

I ran into this binary at a CTF : https://github.com/auehc/AUCTF-2020/tree/master/Pwn/House%20of%20Madness I first tried to exploit it and get a shell using ret2libc technique, however I didn't ...
aguilbau's user avatar
0 votes
0 answers
60 views

I have buffer overflow in a program i check(it is an array of pointers, and i can overflow the data in the first pointer), but the data i can write is not on the stack, it is on a space the system ...
Raien land's user avatar
6 votes
1 answer
428 views

Newbie here. Sorry for what you about to read . I'm currently working on exploiting a binary on Ubuntu 18.04. Here is some information about the binary: Its checksec information using pwntools: ...
Thành Vũ's user avatar
1 vote
2 answers
751 views

This video https://youtube.com/watch?v=4HxUmbOcN6Y presents how modern compilers protect stack overflows with stack cookies and function __stack_chk_fail. How can one identify if a binary has stack ...
wfj96649BcaooCom's user avatar
1 vote
2 answers
193 views

I'm currently playing with buffer overflow and ROP-chains, and I'm facing a weird behavior that I don't know how to deal with. I don't know why, but i cannot correctly push the address of my first ...
Guillaume's user avatar
  • 719
0 votes
1 answer
93 views

I'm learning on how to cause a buffer overflow. My victim program has to read input from a file encoded with UTF-16, 2-bytes by 2-bytes, and I want to overrun the EBP with an address like 0x0012F468. ...
Thành Vũ's user avatar
0 votes
1 answer
145 views

Getting illegal access fault with error The address 0xffdeb9f0 could not be accessed. I am trying to execute a shellcode in buffer overflow vulnerability. I am able to put the shell code at the ...
Mukesh's user avatar
  • 121
1 vote
2 answers
2k views

I am facing problem in finding bad characters because the hex codes are being replaced with \x3F & some other codes. Here I have all the 256 hex chars from \x01 to \xFF and as you can see many of ...
Mukesh's user avatar
  • 121
3 votes
1 answer
343 views

I am doing a simple buffer overflow exercise, here is the source: //vuln.c #include <stdio.h> #include <string.h> int main(int argc, char* argv[]) { char buf[256]; strcpy(buf,argv[...
JoaoAlby's user avatar
0 votes
0 answers
132 views

I want to do a buffer overflow exploit in the stack. For this i read in data via the "gets"-function. void ExploitMe() { char buffer[256]; gets(buffer); } I compile this file with gcc test.c -...
AndiYo's user avatar
  • 49
4 votes
0 answers
1k views

I would like to use angr for vulnerability research. I was thinking that if I did the following: p = angr.Project('a.out', auto_load_libs=False) sm = p.factory.simulation_manager() while len(sm....
user3753771's user avatar
3 votes
1 answer
5k views

I using following C code for testing stack based simple buffer overflow #include<stdio.h> #include<string.h> void copier(char *arg){ char buffer[100]; strcpy(buffer,arg); } int ...
mapper2496's user avatar
0 votes
0 answers
183 views

I was trying to exploit a simple buffer overflow on a self created binary. i have disabled all the security features by compiling with the flags - --fno-stack-protector -z execstack -no-pie. my ...
3xpl017's user avatar
1 vote
0 answers
849 views

I wrote this short C program to practice buffer overflow exploits: #include <stdio.h> #include <string.h> #include <stddef.h> #include <inttypes.h> char *decode(char *s){ ...
corporateWhore's user avatar
2 votes
1 answer
4k views

Working a basic buffer overflow on a 64bit system and putting together some basic shellcode. The main program does a call to puts@plt. When I disassemble main in gdb, the opcodes show as: e8 6b fe ff ...
gr0k's user avatar
  • 225
1 vote
0 answers
252 views

So I have this sample problem that I need to buffer overflow. Its an elf file that require to be run on a separate terminal then using "nc localhost 'port' " on a separate terminal we can see the ...
Omar Elgafri's user avatar
0 votes
1 answer
420 views

the c code: void overflow (char* inbuf) { char buf[64]; strcpy(buf, inbuf); } int main (int argc, char** argv) { overflow(argv[1]); return 0; }
Varun Ravindra's user avatar