Advertisement
Guest User

Untitled

a guest
Sep 15th, 2019
119
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.18 KB | None | 0 0
  1. A buffer overflow vurnerability exists because upon requesting any length of input from the users without checks, it's possible for a user to override the allocated memory space and flow into other spaces of the memory. Usually this results in a crash, but it can also allow the user to gain access to other parts of the memory and run malicious code.
  2.  
  3. 1.1
  4. In this exploit we overwrite the dedicated input memory up until the specific part of the memory we're looking to change, and add our own variable, making the program pass the variable check.
  5.  
  6. 1.2
  7. In this exploit we are able to - using the same methods as last time - overwrite the adress of the return function with the do_system function, granting us access to the flag.
  8.  
  9.  
  10. An SQL injection is a way of injection malicious code into a user database, granting the user access to data which it is not supposed to. It's done by confusing the SQL interpreter into granting you the incorrect privleges by warping the structure of a pre-made SQL statement.
  11.  
  12. 2.1
  13. Since there is no check for special characters, we close the user-input (string) part of the SQL statement and overwrite the rest of the checks, granting us admin access.
  14.  
  15. 2.2
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement