App - System

Monday 23 July 2018, 03:45  #1
App - System : Buffer Overflow 4
jam
jam
  • 99 posts

Dear Sir or Madam,

i just typed in my shell code into one of the env. address. I was able to make up a buffer overflow by env. variable over flooding. I checked about the return address and found it could be possible to call the shell code and make it to read the password file. There is one problem i was struggling about. The randomized function of variable addresses makes the stuff a bit more crazy than i was thinking of. The random-byte must have been brute forced so when the code returns, it will jump to the address i gave in and make it working. I tried it many times. No luck. But there could be another sense of humor.
I also read the other messages in this forum. There is nothing special most of the time.
Thx in advance
Good luck and have fun,
bye..

Tuesday 24 July 2018, 22:01  #2
App - System : Buffer Overflow 4
jam
jam
  • 99 posts

Hi all,

As i had written before, there is a way to make it working. The ltrace command could be helpful. I am writing the shell code to an address. I had forgotten to push these in an other order to get rid of that.
Good luck,
 🤑
i am working on.
thx for watching,