Approved 2024/09/01 22:45 by psycore (version: 5) | Approver: psycore
#nosoc blog
$^\xi xpec_tthe ^un \xi xpecte_d$
Buffer overflow in the 64-bit stack - Part 2
In the second part, we activate the NX bit, which is intended to protect us from buffer overflows. To keep things fun, we will of course override this protection directly. We achieve this by passing the command to be executed to the libc-Funktion system()
is forwarded. This tutorial is fundamentally based on the work of superkojiman 1)
FatCat Attack PoC
_____ _ ____ _ | ___|_ _| |_ / ___|__ _| |_ | |_ / _` | __| | / _` | __| | _| (_| | |_| |__| (_| | |_ |_| \__,_|\__|\____\__,_|\__| Attack PoC
This PoC is for demonstration and training purposes only - misuse is prohibited. strafbar2) |
Buffer overflow in the 64-bit stack - part 1
In this tutorial, we will create a buffer overflow on the 64-bit stack to gain root privileges.3)
Technical details on buffer overflows, stack etc. can be found here4)
ActiveDirectory
Android
apache
apt
automate
awareness
backdoor
backup
basics
blog
chatgpt
cheatsheet
collabora
collection
courier
cron
Debian
dns
firefox
froxlor
IRC
IT-Security
kali
Linux
mirc
mysql
n8n
network
obfuscation
owncloud
pentest
postfix
registry
shellcode
sshd
TLS
unrealircd
wallabag
Windows
windows10
windows11
Windows10
Windows11
windows_8