Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
en:it-security:blog:buffer_overflow_x64 [2024/04/14 12:45] – psycore | en:it-security:blog:buffer_overflow_x64 [2024/08/02 12:31] (current) – psycore | ||
---|---|---|---|
Line 3: | Line 3: | ||
====== Buffer overflow in the 64-bit stack - part 1 ====== | ====== Buffer overflow in the 64-bit stack - part 1 ====== | ||
- | In this tutorial, we will create a buffer overflow on the 64-bit stack to gain root privileges. erlangen.((https:// | + | In this tutorial, we will create a buffer overflow on the 64-bit stack to gain root privileges.((https:// |
- | Technical details on buffer overflows, stack etc. can be found at hier((https:// | + | Technical details on buffer overflows, stack etc. can be found here((https:// |
\\ | \\ | ||
\\ | \\ | ||
===== Dependencies ===== | ===== Dependencies ===== | ||
+ | |||
+ | {{page> | ||
{{page> | {{page> | ||
Line 22: | Line 24: | ||
==== gdb-peda Exploit Tools ==== | ==== gdb-peda Exploit Tools ==== | ||
- | gdb-peda extends the debugger GDB with helpful commands to exploit | + | gdb-peda extends the debugger GDB with helpful commands to exploit.((https:// |
<code bash> | <code bash> | ||
Line 204: | Line 206: | ||
==== Attack ==== | ==== Attack ==== | ||
- | First we set root rights to the vulnerable file and start diese((https:// | + | First we set root rights to the vulnerable file and start it((https:// |
<code bash> | <code bash> |