Hi evryone !,
In this entry i show how to exploit a mail server slmail 5.5 that is vulnerable to buffer overflow:
The source code:
https://github.com/f0ns1/-Exploiting-BufferOverflow/blob/main/final_exploit_smail_5.5.py
With best regards, f0ns1
Hi evryone !,
In this entry i show how to exploit a mail server slmail 5.5 that is vulnerable to buffer overflow:
The source code:
https://github.com/f0ns1/-Exploiting-BufferOverflow/blob/main/final_exploit_smail_5.5.py
With best regards, f0ns1
Hi evryone !,
In this entry i show how to exploit a web server Kolibri 2.0 that is vulnerable to buffer overflow:
The source code of the exploit:
https://github.com/f0ns1/-Exploiting-BufferOverflow/blob/main/exploit_kolibri_2_0_webserver.py
With best regards; f0ns1
Hi everyone!!,
In this entry i explain buffer overflow smashing attack step by step Step by step:
Source code:
| #include <string.h> | |
| #include <stdio.h> | |
| # | |
| #void do_something(char *Buffer) | |
| #{ | |
| # char MyVar[128]; | |
| # strcpy(MyVar, Buffer); | |
| #} | |
| #Main program | |
| #int main(int argc, char **argv) | |
| #{ | |
| # do_something(argv[1]); | |
| # printf("Done\n"); | |
| #} | 
https://github.com/f0ns1/-Exploiting-BufferOverflow/blob/main/basic_overflow.py
With best reagrds, we keep in touch !! f0ns1
Hi everyone,
This is a new entry on my personal blog about, Buffer overflow stack smashing attack:
Video:
Source code:
https://github.com/f0ns1/-Exploiting-BufferOverflow/blob/main/auditran_exploit.py
With best regards,
f0ns1!! we keep in touch
En la jornada posterior a un evento importante toca analizar, en este caso me centro en mi participación como speaker en #librecon2022. ¿Cóm...