selftaught
Follow
-
Bluehost
- Portland
Pinned Loading
-
ret2libc stack overflow
ret2libc stack overflow 1# Exploiting a Stack Buffer Overflow (return-to-libc attack)
23A stack buffer overflow occurs when a program writes to a memory address on it's call stack outside of the intended structure / space.
45In this walk-through, I'm going to cover the ret2libc (return-to-libc) method. This method of exploitation is great because it doesn't require the use of your typical shellcode. It involves making sys calls to the functions provided to us by libc (standard c library). We're going to use the `system` and `exit` sys calls for demonstration.
-
hacking-resources.md
hacking-resources.md 1# TOC
2- [Tools](#tools)
3- [Networking](#networking)
4- [Bluetooth](#bluetooth)
5- [Pentesting Frameworks](#penetration-testing-frameworks)
-
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.