exploit
How to write a buffer-overflow exploit in GCC,windows XP,x86?
void function(int a, int b, int c) { char buffer1[5]; char buffer2[10]; int *ret; ret = buffer1 + 12; (*ret) += 8;//why is it 8??[详细]
2022-12-25 15:40 分类:问答shellcode is truncated by \x20
Why is my shellcode is truncated after \\x20 opcode, when it is copied by string to stack on a second vulnerable program?[详细]
2022-12-23 13:16 分类:问答Detecting exploits in web applications and how to proceed
What ways are there for detecting exploits in PHP/MySQL web applications (checking for certain characters or pieces of codes in the GET, POST, COOKIE arrays / using a library with a database that has[详细]
2022-12-19 08:28 分类:问答PHP magic_quotes_gpc vulnerability
I\'ve been assigned to one of my company\'s legacy webapps, and after a day or two of poking around the source, I\'ve found an SQL injection vector similar to the following:[详细]
2022-12-18 03:22 分类:问答Creating Windows Account using C++
I will give a basic rundown of the situation first. I work for a game server re开发者_如何学运维ntal company that is falling victim to an exploit inside of a major game engine (source). Basically, the[详细]
2022-12-16 19:06 分类:问答PHP GET variable array injection
I\'ve recently learned that it\'s possible to inject arrays into PHP GET variables to per开发者_开发知识库form code execution?[详细]
2022-12-14 05:33 分类:问答What are some advanced and modern resources on exploit writing?
I\'ve read and finished both Reversing: Secrets of Reverse Engineering and Hacking: The Art of Exploitation.They both were illuminating in their own way but I still feel like a lot of the techniques a[详细]
2022-12-13 12:18 分类:问答