App - System
App - System : Buffer Overflow 4
Dear Sir or Madam,
i just typed in my shell code into one of the env. address. I was able to make up a buffer overflow by env. variable over flooding. I checked about the return address and found it could be possible to call the shell code and make it to read the password file. There is one problem i was struggling about. The randomized function of variable addresses makes the stuff a bit more crazy than i was thinking of. The random-byte must have been brute forced so when the code returns, it will jump to the address i gave in and make it working. I tried it many times. No luck. But there could be another sense of humor.
I also read the other messages in this forum. There is nothing special most of the time.
Thx in advance
Good luck and have fun,
bye..
App - System : Buffer Overflow 4
Hi all,
As i had written before, there is a way to make it working. The ltrace command could be helpful. I am writing the shell code to an address. I had forgotten to push these in an other order to get rid of that.
Good luck,
🤑
i am working on.
thx for watching,