Skip to main content
2 votes
2 answers
225 views

I'm learning about shellcode execution in C and I've seen two different approaches. I understand the first one is for exploitation, but I'm confused about the type casting. Approach 1: Stack Overflow ...
Vasan Dilaksan's user avatar
4 votes
0 answers
152 views

I am executing shell-code in executable stack memory: xor rax,rax ; push rax ; mov rbx,0x68732f2f6e69622f ; push rbx mov rdi,rsp ; ...
Joshua Singla's user avatar
4 votes
1 answer
202 views

I made a simple vulnerable program greet.c: #include <stdio.h> #include <string.h> int main (int argc, char **argv) { char buf[32]; strcpy(buf, argv[1]); printf("%s\n"...
AISK's user avatar
  • 65
1 vote
1 answer
302 views

Sorry if this sounds like a stupid question but I am new to shellcoding ... Can anyone tell me how to reduce the number of instructions in this assembly code leveraging the chmod (90) syscall: xor ...
Tanmay Sharma's user avatar
1 vote
1 answer
174 views

I am doing a cybersecurity challenge and need to open a shell using shellcode. The usual shellcode is \x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x53\x89\xe1\x31\xd2\x50\x52\x51\...
Exekr's user avatar
  • 21
0 votes
1 answer
95 views

I'm trying to write a shellcode in x86_64 assembly that opens a file located at /challenge/flag using the open syscall. However, my implementation doesn't seem to work as intended. The path seems to ...
Aylan Hanifi's user avatar
-4 votes
1 answer
110 views

CreateRemoteThread() fails with error 5 when calling inject_param->allocate() in inject_begin(). Comment it and CreateRemoteThread() is OK. I dont know why. The target platform is 64-bit. #include &...
Yulin.Li's user avatar
0 votes
0 answers
149 views

To exploit the buffer overflow vulnerability in a challenge program, I need to craft a payload that satisfies a palindrome check and executes arbitrary code. This requires creating a palindromic ...
user27263189's user avatar
3 votes
2 answers
230 views

I'm trying to create a main. I compiled my code with: $ gcc -g3 -o shellcode shellcode.c But I always get a Segmentation fault (core dumped) Using GDB, I see that the first instruction is executed ...
Asile34's user avatar
  • 505
5 votes
2 answers
131 views

I am learning about shellcode development in C with an example from here. I can compile the assembly code and get de opcodes, also I can run successfully the ELF compiled with NASM, but I get a ...
RobertGG's user avatar
  • 135
2 votes
0 answers
154 views

I'm trying to play around with asm and shellcode, my target is to manage to dlopen a custom library. I've created a code in C that calls a fake dlopen method, compiled it and used objdump to extract ...
Marcel's user avatar
  • 81
1 vote
0 answers
99 views

I am writing x64 assembly code to invoke VirtualAllocEx win32 API (as part of process injection lab, so I am injecting into explorer.exe) and seeing unusual (to me) behavior. The documentation states ...
ab ab's user avatar
  • 11
2 votes
0 answers
71 views

I have a C program that parses the PEB and gets kernel32.dll and then with a custom GetProcAddress it gets the address to LoadLibrary. After that I get the address of MessageBoxA. My goal is to ...
drexco's user avatar
  • 21
0 votes
0 answers
78 views

Here is a snippet of a shellcode that i have from a course i am taking it claims simulate a buffer overflow I am not clear how it works section .data payload db 'This is the payload of the exploit....
clive's user avatar
  • 15
0 votes
0 answers
191 views

So basically the problem is as follows: I have written a ROP chain that calls shellcode from the stack. The ROP chain has also been tested with simple shellcode to call a calculator and it works. This ...
xler's user avatar
  • 1

15 30 50 per page
1
2 3 4 5
47