About 147,000 results
Open links in new tab
  1. shell script - Run shellcode as root in a buffer overflow attack ...

    Mar 7, 2024 · Run shellcode as root in a buffer overflow attack? Ask Question Asked 1 year, 8 months ago Modified 1 year, 8 months ago

  2. buffer overflow - How to do a bufferoverflow attack for a simple C ...

    Dec 11, 2024 · That’s the intentional bug causing a buffer overflow vulnerability. Now you need to work out how to overwrite the return address of the main function on the call stack with the address of …

  3. Buffer Overflow Exploit - Injecting Code & Redirecting Execution in ...

    Mar 3, 2025 · Buffer Overflow Exploit (x86-64, Attack Lab Phase 2) - Injecting Shellcode for Function Call Objective I am working on a buffer overflow attack for an x86-64 binary (Attack Lab, Phase 2) …

  4. How to find the Return Address when performing a Buffer Overflow …

    Apr 9, 2021 · I have been learning buffer overflow attack recently. After several online tutorials, I got this small task asking me to use buffer overflow to obtain the root access of the server.

  5. input validation - Can buffer overflow attacks become impossible ...

    Feb 14, 2025 · Which sound similar to what I suggested. So why buffer overflow attacks still happen? Is it because it is technically hard to stop buffer overflow attacks or because other reasons like …

  6. Are buffer overflow and similar attacks still possible?

    Aug 12, 2021 · Unfortunately, yes, buffer overflow and similar attacks are still possible. Microsoft has found approximately 70% of security vulnerabilities are various forms of memory unsafety, including …

  7. Buffer Overflow Attack when size of Buffer is small on 64bit CPU ...

    Nov 8, 2023 · 1 I was trying to solve the Buffer Overflow SetUID lab but stuck in Task 6: L4, to perform the attack when the Buffer Size is small 10. I understood that since len (shellcode) would be larger …

  8. Buffer Overflow Attack

    Sep 8, 2011 · A buffer overflow attack is a lot more complex than this. First of all you need to understand assembler in order to perform this. After you disassemble the program and function you want to …

  9. c - How does a NOP sled work? - Stack Overflow

    Apr 6, 2018 · I can't find a good source that answers this question. I know that a nop sled is a technique used to circumvent stack randomization in a buffer overflow attack, but I can't get my head around …

  10. How can a Format-String vulnerability be exploited? - Stack Overflow

    Sep 18, 2011 · The second version simply prints a string to the screen, as the programmer intended. I got the problem with printf (buffer) version, but I still didn't get how this vulnerability can be used by …