The MASM Forum

General => The Laboratory => Topic started by: longfloat on April 24, 2024, 12:35:19 AM

Title: x86 buffer overrun help
Post by: longfloat on April 24, 2024, 12:35:19 AM
Hey guys, im a cs undergraduate and we are learning about buffer overrun attacks. Im using a shellcode as shown below to overwrite some string literals of a printf in .rodata using mprotect() but i keep getting segmentation fault here:
Program received signal SIGSEGV, Segmentation fault.

[Deleted]

Im suspecting that this has smth to do with the stack pointers but i cant figure what it is yet. Can someone help?
Title: Re: x86 buffer overrun help
Post by: zedd151 on April 24, 2024, 01:46:51 AM
What exactly are you trying to do? "shellcode"?
I don't know what either .rodata and mprotect() are... elaborate, please.

 This???  (https://man7.org/linux/man-pages/man2/mprotect.2.html) mprotect() that is...
I don't speak Linux.
Title: Re: x86 buffer overrun help
Post by: Biterider on April 24, 2024, 02:11:40 AM
Hi longfloat
Illegal activities such as attacks or exploits are not allowed in this forum.
Please read the forum rules here https://masm32.com/board/index.php?topic=4.0 (https://masm32.com/board/index.php?topic=4.0)
In particular this one:

QuoteLegality of content
3. Legality of content is not a negotiable matter in the forum. Assembler programming is mainstream programming and is primarily used by professional programmers who require the performance in specialised areas. Low level coding is both allowed and encouraged but there will be no viral or trojan technology allowed including technical data under the guise of AV technology, no cracking and similar activities in the guise of "Reverse Engineering", no hacking techniques or related technology and no support or help with or reference to pirated software. There will also be no links to pages that support or display any of these or any other illegal areas of coding.

Regards, Biterider
Title: Re: x86 buffer overrun help
Post by: longfloat on April 24, 2024, 04:00:11 AM
οκ feel free to take it down
Title: Re: x86 buffer overrun help
Post by: NoCforMe on April 24, 2024, 10:53:29 AM
Please see my take on the whole "reverse engineering"/hacking thing here (https://masm32.com/board/index.php?topic=11874.0).
Title: Re: x86 buffer overrun help
Post by: NoCforMe on April 25, 2024, 09:47:25 AM
Quote from: longfloat on April 24, 2024, 12:35:19 AMHey guys, im a cs undergraduate and we are learning about buffer overrun attacks. Im using a shellcode as shown below to overwrite some string literals of a printf in .rodata using mprotect() but i keep getting segmentation fault here:

Could you be kind enough to explain a little more about your interest in buffer overrun attacks? If you've read threads here lately there's been quite a bit of concern over this, and people here are wondering what your motive is for exploring this. From what you wrote it sounds like this is part of a class you're taking; is that so?

Thanks!
Title: Re: x86 buffer overrun help
Post by: jj2007 on April 25, 2024, 05:42:55 PM
Quote from: NoCforMe on April 25, 2024, 09:47:25 AMCould you be kind enough to explain a

Date registered: April 23, 2024, 03:18:32 PM
Last active: April 23, 2024, 06:59:45 PM

He immediately lost interest. Strange, isn't it?
Title: Re: x86 buffer overrun help
Post by: NoCforMe on April 26, 2024, 04:31:15 PM
Maybe. Or maybe you just scared them off so they'll never set foot here again.
Title: Re: x86 buffer overrun help
Post by: jj2007 on April 26, 2024, 04:54:52 PM
We had many candidates who were "scared off" as soon as they understood that we wouldn't help them realise their projects :biggrin: