We found that we could cause a segmentation fault in the target using some specific inputs. In this post (and in this video), we will cover the next step: confirming if the crash can lead to a vulnerability. To do so, we’ll use GDB, the GNU debugger, and PEDA to analyze the execution of the target while processing the inputs previously generated by AFL. By doing so, we will find a way to hijack the execution flow from the Vuln1 program in order to execute our own code
https://thecyberrecce.net/tag/technology/
Subscribe to:
Post Comments (Atom)
-
Um grupo anarquista internacional, sediado em Atenas na Grécia, designado por PHK, pretende comprar por 50.000 euros, uma bomba radioactiva ...
-
I am currently developing an APP to create a communication field between two devices over Wi-Fi tethering and TCP protocols. The first o...
No comments:
Post a Comment