Description: Twitter: @SlyDGotcha
Blog: redpathintel.blogspot.com
This is a buffer overflow example from the book Grey Hat Hacking: The Ethical Hackers Handbook 2nd. edition. This video is used to demonstrate the concept of exploiting a buffer overflow.
I do my best to explain the stack here, and how to exploit our vulnerable piece of code. I apologize for not going into too much detail. However, this demonstration should be enough to bring insight to what a buffer overflow is, and how it can be exploited.
If you see something you don't understand, please let me know and I will do my best to explain.
Tags: buffer overflow , demo , tutorial , walkthrough , example , Grey Hat Hacking , exploitation , stack ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
I have a problem concerning the memory protection for Ubuntu 10.10. There isn't a config for "exec-shield" anymore, only for ASLR. But my exploits doesn't work, and I don't know how Ubuntu 10.10 protects his memory.
Hope you can help me :)
Thank for your buffer overflow example.
Pls post the code of sc file from $ wc -c sc section and explain why the size of shell code is 53.
Hope you can help me.
Tks
@fabuloes going to have to utilize some more googlefu there.
@Bachtung: The SC File simply contains shell code. The size of the shell code is 53 because the shell code is 53 bytes long. I cannot paste copyright information onto the internet. However, you can get shellcode from Metasploit. This tutorial here should put you in the right direction, let me know how it goes. http://www.projectshellcode.com/node/29