Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

using a buffer overflow exploit

NotificationsYou must be signed in to change notification settings

scarlet-oni/buffer-overflow-exploits

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 
 
 

Repository files navigation

 #######  ##  ##   ######   ####      #####    ####    ######    #####  ##   #  ##  ##    ##  ##   ##      ##   ##    ##     # ## #   ##   ##  ## #     ####     ##  ##   ##      ##   ##    ##       ##     #  ####      ##      #####    ##      ##   ##    ##       ##      #####  ## #     ####     ##       ##   #  ##   ##    ##       ##          ##  ##   #  ##  ##    ##       ##  ##  ##   ##    ##       ##     ##   ## #######  ##  ##   ####     #######   #####    ####     ####     #####_______________________________________________________________________                                 ABOUT_______________________________________________________________________Description: Using a buffer overflow exploitRepository: Buffer owerflow exploitsGCC-Compilier: 14.2.0Tested on: Linux 6.11.2Author: scarlet-oni_______________________________________________________________________                        #1 EXAMPLE OWERFLOW _______________________________________________________________________gcc example_owerflow.c./a.out <arg>// the variable buffer_1 is located in memory immediately after buffer_2, // 5 bytes are allocated for both lines, // if we exceed the input of the first buffer, // then it will replace other variables and starting from a certain size will cause the program to terminate// input 8 bytes./a.out 12345678---[ BEFORE ] buffer_2 info: 0x7ffc9eb5b4d2 | str2[ BEFORE ] buffer_1 info: 0x7ffc9eb5b4d7 | str1[ BEFORE ] value info: 0x7ffc9eb5b4dc | 5 (0x00000005)[ STRCPY ] buffer_2 was writed 8 bytes[ AFTER ] buffer_2 info: 0x7ffc9eb5b4d2 | 12345678[ AFTER ] buffer_1 info: 0x7ffc9eb5b4d7 | 678[ AFTER ] value info: 0x7ffc9eb5b4dc | 5 (0x00000000)// input 10 bytes./a.out 1234567891---[ BEFORE ] buffer_2 info: 0x7ffe162329c2 | str2[ BEFORE ] buffer_1 info: 0x7ffe162329c7 | str1[ BEFORE ] value info: 0x7ffe162329cc | 5 (0x00000005)[ STRCPY ] buffer_2 was writed 10 bytes[ AFTER ] buffer_2 info: 0x7ffe162329c2 | 1234567891[ AFTER ] buffer_1 info: 0x7ffe162329c7 | 67891[ AFTER ] value info: 0x7ffe162329cc | 0 (0x00000000)// input 15 bytes ./a.out 123456789123456---[ BEFORE ] buffer_2 info: 0x7ffd0e05b892 | str2[ BEFORE ] buffer_1 info: 0x7ffd0e05b897 | str1[ BEFORE ] value info: 0x7ffd0e05b89c | 5 (0x00000005)[ STRCPY ] buffer_2 was writed 15 bytes[ AFTER ] buffer_2 info: 0x7ffd0e05b892 | 123456789123456[ AFTER ] buffer_1 info: 0x7ffd0e05b897 | 6789123456[ AFTER ] value info: 0x7ffd0e05b89c | 892613426 (0x00000000)// input 25 bytes./a.out 123456789123456123456789---[ BEFORE ] buffer_2 info: 0x7fff97808d62 | str2[ BEFORE ] buffer_1 info: 0x7fff97808d67 | str1[ BEFORE ] value info: 0x7fff97808d6c | 5 (0x00000005)[ STRCPY ] buffer_2 was writed 24 bytes[ AFTER ] buffer_2 info: 0x7fff97808d62 | 123456789123456123456789[ AFTER ] buffer_1 info: 0x7fff97808d67 | 6789123456123456789[ AFTER ] value info: 0x7fff97808d6c | 892613426 (0x00000000)zsh: segmentation fault (core dumped)  ./a.out 123456789123456123456789_______________________________________________________________________                      #2 NOTE SEARCHER EXPLOIT_______________________________________________________________________// launchgcc -o notesearcher.o note_searcher.cgcc exploit_notesearcher.c./a.out// You can set the offset yourself./a.out <your offset>______________________________________________________________________                          LEGAL STATEMENT______________________________________________________________________By downloading, modifying, redistributing, and/or executing buffer-overflow-exploits, theuser agrees to the contained LEGAL.txt statement found in this repository.I, scarlet-oni, the creator, take no legal responsibility for unlawful actionscaused/stemming from this program. Use responsibly and ethically!

About

using a buffer overflow exploit

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages


[8]ページ先頭

©2009-2025 Movatter.jp