python (65.2k questions)
javascript (44.3k questions)
reactjs (22.7k questions)
java (20.8k questions)
c# (17.4k questions)
html (16.3k questions)
r (13.7k questions)
android (13k questions)
Create array with ROP chain (64-bit)?
in order to solve a binary exploitation CTF-Challenge I have to create an array of arguments to pass to a syscall. I searched a lot on the internet, but I can't find a description on how to create an ...
pekusbill
Votes: 0
Answers: 1
Same stack overflow exploit written in different languages doesn't give same results
I was writing a stack overflow exploit in C against stack-two of exploit.education.
A little modified version of the the stack-two program is as follows:
/*
* phoenix/stack-two, by https://exploit.ed...
whh
Votes: 0
Answers: 1
Why local variable addresses are different by which program started it?
I ran into a confusion about memory address issue during my experiment to practice CTF pwn questions.
I tried to find the start pointer address of a local array variable to insert shellcode with Radar...
kyasbal
Votes: 0
Answers: 0
Why cannot rewrite EIP even if disabled memory randomization and no stack protector?
I am following tutorial on youtube about basic buffer overflow "Running a Buffer Overflow Attack - Computerphile" and I cannot overwrite EIP value on Kali linux 2021.2.
#include <stdio.h&...

Miroslav Savel
Votes: 0
Answers: 0