Skip to main content
We’ve updated our Terms of Service. A new AI Addendum clarifies how Stack Overflow utilizes AI interactions.

Questions tagged [binary-code]

Filter by
Sorted by
Tagged with
-1 votes
1 answer
294 views

I started reading "Hacking, The Art of Exploitation" and I am confused about some things regarding memory examination. When I disassemble main, I get an output of all memories where the ...
jprossv's user avatar
0 votes
1 answer
734 views

I'm doing a binary challenge from pwnable.kr and I'm examining a some ROP gadget. Until now I've always used gadget ending with ret or syscall/int 0x80, but now ROPgadget gave me a gadget ending with ...
Marco Balo's user avatar
1 vote
1 answer
614 views

Excuse the naive question but I'm trying to understand a bit about security in home health and medial devices and a recent report about how home Covid test results can be altered has left me a bit ...
orome's user avatar
  • 333
-1 votes
1 answer
1k views

I have come across a lot of guides and blogs about reverse engineering where they use labs to teach various techniques and methods to break binaries. My question is what actual use cases does reverse ...
Abhinav Vasisth's user avatar
0 votes
0 answers
31 views

The thing that helped me to understand what is a "public key" was to parallel it with a door lock: The door lock is public in the sense that anyone can try to unlock it and the door key is ...
humble-learner's user avatar
0 votes
1 answer
357 views

This question is about if any technologies used by a web browser (HTTP, TCP, JavaScript, etc.) can be used to push a binary file from the web server to a random folder on the client. This is for a ...
user avatar
1 vote
1 answer
250 views

I am pentesting a web application. It makes a backend call to another application, and I am trying to hijack that call. I have gained control over the URL path, query parameters, and fragment that is ...
Bob's user avatar
  • 99
0 votes
0 answers
546 views

I have a C code project, I want to use .so lib to verify certificate for valid. I know there is a way to crack .so file by using below tools: 1.IDA_Pro_v6.8_and_Hex-Rays_Decompiler_ 2.WinHex 3....
244boy's user avatar
  • 935
2 votes
1 answer
471 views

Using standard hardening options like PIC, Stack Protection ... does a mere recompilation make a program more secure against attacks? You have the source code of a program, compile it two times with ...
plsrespond's user avatar
0 votes
1 answer
177 views

Discussion under this answer in Space Exploration SE links to items in NAIF; NASA Planetary Data System Navigation Node links for MacIntel_OSX_64bit I'm looking at these two. spy: https://naif.jpl....
user avatar
1 vote
0 answers
485 views

The challenge data is: ...
CtfLover's user avatar
0 votes
1 answer
151 views

I (will) have a binary executable file. It's only permission is user-execute. It cannot be read by user, group, or world. The owner of the file is the Apache user. I don't want the apache user to be ...
Reed's user avatar
  • 105
2 votes
0 answers
189 views

Kernels like linux-libre (standard in Debian and other free Linux distributions) ship no binary firmware packages by default. From my limited understanding of their functionality, a binary firmware ...
Prototype700's user avatar
1 vote
1 answer
2k views

I'm learning about format string exploits, and am attempting to use one on an example program to overwrite the .fini_array section in virtual memory with a stack address containing shellcode (and ...
Atticus Stonestrom's user avatar
9 votes
0 answers
2k views

My question is about the use of ultrasonic messages that are part of the modern advertising ecosystem and are also used by the Google Nearby Messages API. When it comes to advertising, the type of ...
user100487's user avatar
0 votes
0 answers
278 views

I'm trying to use overthewire narnia problems as a way to learn about binary exploitation and I'm getting different results than any of the walkthroughs I was looking at https://tuonilabs.wordpress....
CWright's user avatar
  • 123
2 votes
0 answers
503 views

I am trying to upsolve a challenge from a CTF I played but I just can't get it right. I think you have to somehow manage to use buffer overflow, but I can't see what I'm doing wrong since this works ...
C. Cristi's user avatar
  • 121
1 vote
0 answers
169 views

I have a binary file and saved it on github release page. https://github.com/zono/bolt8/releases To allow users to verify it, I saved sha256sum and signature(.asc). However I have a concern that if ...
zono's user avatar
  • 185
-1 votes
3 answers
1k views

Would using a 256-bit binary string, for e.g. ...
Woodstock's user avatar
  • 699
7 votes
2 answers
919 views

I was recently reading through a write up on a capture the flag Linux VulnHub machine. For privilege escalation, the author references 'bash function manipulation'. A Google search turns up very ...
n00b's user avatar
  • 465
3 votes
1 answer
232 views

Is there any good reason not to run a brief unknown (30 line) assembly script inline in a usermode c program for dynamic analysis directly on my laptop? There's only one system call to time, and at ...
comp.sci.intern's user avatar
2 votes
0 answers
197 views

I watched https://www.youtube.com/watch?v=B8DjTcANBx0 and in this video he downloads several camera firmwares and analyzes their files. As far as I know, the firmwares are binary files that you can ...
Poperton's user avatar
  • 317
0 votes
1 answer
223 views

If researcher found satisfiability in any software, this is a threat to security? If answer - "Yes", how can attacker to use SAT?
69 420 1970's user avatar
1 vote
1 answer
184 views

Frequent scenario: An old game is released on GOG / Steam. It proves to be incompatible with new Windows systems. (Crashes, game breaking bugs, fps of 0.5 and the likes) An unofficial patch is ...
gaazkam's user avatar
  • 6,851
1 vote
2 answers
2k views

I want to make well-known malicious programs, like Mimikatz and Incognito, undetectable by anti-virus solutions. I have already tried various approaches myself, like packing the binary with UPX or ...
Shuzheng's user avatar
  • 1,317
1 vote
1 answer
762 views

I'm doing basic exploitation test on a simple program with fiew lines of code. I intend to exploit a buffer overflow vulnerability to perform a ROP attack. To gather the available gadgets I use ...
Ahmed's user avatar
  • 83
1 vote
1 answer
668 views

I have a binary that is SUID which I can currently use a buffer overflow exploit to obtain an elevated EUID shell. However I haven't worked much with changing IDs through shellcode, and the file I ...
Sif's user avatar
  • 13
6 votes
2 answers
2k views

During the security assessment of Android applications, I have encountered multiple instances where .so (Shared Objects) files are present in lib directory. What can be possible security test cases ...
Shiv Sahni's user avatar
4 votes
1 answer
226 views

Unidirectional Data Transmission to a Smartphone I'm going to use an old Android phone to store sensitive data (e.g., Bitcoin wallet private key), with no SIM card and WiFi and Bluetooth turned off. ...
anton_'s user avatar
  • 41
1 vote
0 answers
105 views

Some background: My org is potentially involved in a legal dispute with a securities brokerage in a under-developed country with mediocre rule of law. The broker also is responsible for co-locating a ...
user79126's user avatar
  • 151
-1 votes
1 answer
309 views

I'm a network Penetration Tester and I'm trying to learn how to crack binaries. As an exercise, I've spent two days trying to crack a Linux binary that was supposedly designed to be cracked. ...
user7451333's user avatar
0 votes
0 answers
433 views

I am starting to use npm install a lot for development, but I fear about its security consequences. Does npm install retrieve binaries or sources? If it's binaries, it's already a deal breaker for ...
knocte's user avatar
  • 161
1 vote
2 answers
228 views

I have a binary file which uses some exploit(i guess, it was generated with metasploit), but I can`t determine the exact exploit it uses. The disassembly listing of it contains a plenty of "mov" ...
AseN's user avatar
  • 154
-2 votes
1 answer
517 views

I was looking at this exercise and it was mentioned that the string \x1AL\xD23k\xCA\x1D\xD7 consists of 8 bytes. However, I fail to see how there are 8 bytes in the string. Shouldn't there be 7 bytes ...
Lew Wei Hao's user avatar
15 votes
1 answer
5k views

First Hand Details TEG (The Equation Group) is NSA's team of hackers who'd write code to exploit systems worldwide. Some of the private files were recently dropped by a group called Shadow Brokers and ...
Shritam Bhowmick's user avatar
1 vote
0 answers
302 views

After researching on rooting processes low level details and techniques i found that it happens mostly through Buffer overflow to gain root access via running payload ( binaries ) at return call ...
Nayyar's user avatar
  • 11
1 vote
1 answer
16k views

So, this online discussion function use decoded account names in every post, along with that they call "logging data", an example of this can be: Loggin data: 10878 Encoded account info: ...
Sandman's user avatar
  • 111
2 votes
1 answer
700 views

I'm writing an assignment for a security course, and I'm trying to create an executable which students can interact with (ie, execute), but not inspect. In particular what I'd like is for them to be ...
joshlf's user avatar
  • 123
11 votes
4 answers
7k views

I wonder which of these things is more secure. Imagine hard coded credentials, similar to this: if user.Equals("registereduser") && (password.Equals(encryptedpassword)) { Give access to ...
user3421's user avatar
  • 119
0 votes
1 answer
571 views

I want to understand how a vulnerable internet facing process on some computer is exploited to run arbitrary binary code. I understand how buffer overflows could be used to overwrite the return ...
emberfang's user avatar
  • 199
8 votes
4 answers
4k views

My questions is related with static code analysis approach used by Veracode vs Fortify/AppScan. Veracode – Finds security flaws in application binaries and bytecode without requiring source Fortify/...
hindiuniversity's user avatar
3 votes
2 answers
1k views

In a modern OS I think that: the .text section where binary assembled CPU instructions are stored cannot be modified the .data/.bss section is marked as no-execute so that the information there will ...
emberfang's user avatar
  • 199
6 votes
1 answer
8k views

I am a beginner in Reverse Engineering and am trying to improve my skill by participating in any CTF's I can and solving CrackMe's. I am trying to find out why Binary Exploitation and Reverse ...
bi0s.kidd0's user avatar
2 votes
1 answer
523 views

I'm reviewing an Android app (consists of Java and C source). There are complicated obfuscation steps in the build process (for content protection). But it uses statically linked openssl library ...
9dan's user avatar
  • 133
2 votes
1 answer
2k views

Background: I'm working with Node's crypto library. I'm using PBKDF2 to convert a variable-length binary "passphrase" into constant-length keys for an AES cipher later on. The underlying source of ...
smitelli's user avatar
  • 2,115
19 votes
8 answers
2k views

Two separate discussions have very recently opened my eyes to an issue I had not considered – how to confirm the Open Source binary that one uses is based on the published source code. Zooko Wilcox-O'...
zedman9991's user avatar
  • 3,447
4 votes
1 answer
381 views

It is a well known vulnerability that a properly altered compiler binary can transfer itself to new binaries of the compiler, and still be entirely absent from the source code. But how real is this ...
lurscher's user avatar
  • 1,250
22 votes
2 answers
6k views

It seems like there is no practical way to verify the full integrity path of precompiled and packaged software? I can check the downloaded package itself by hashes, but I have no verification if the ...
flori's user avatar
  • 391
8 votes
5 answers
2k views

I understand that with OpenSource software, my milage may vary based on the trust of the author and the distribution platform they use (Codeplex, Git, or private server). Oftentimes a FOSS website ...
makerofthings7's user avatar
2 votes
1 answer
4k views

I'm working on a project basically a web application. It accepts code (java, c, c++) from client, compile and execute on server and return the results back to client. As I'm going to execute code on ...
VishalDevgire's user avatar