Advertisement
GoodiesHQ

Vulnerable BOF File

Jan 14th, 2014
286
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
C 0.40 KB | None | 0 0
  1. #include <stdio.h>
  2. #include <string.h>
  3.  
  4. void setname(char* input){
  5.         char name[622]; //replace 622 with your random number
  6.         strcpy(name, input);
  7.         printf("Hello %s!\n", name);
  8. }
  9.  
  10. int main(int argc, char** argv){
  11.         if(argc != 2){
  12.                 printf("No Argz or too much Argz\n");
  13.                 return 0;
  14.         }
  15.         setname(argv[1]);
  16.         return 0;
  17. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement