News:

Masm32 SDK description, downloads and other helpful links
Message to All Guests
NB: Posting URL's See here: Posted URL Change

Main Menu

x86 buffer overrun help

Started by longfloat, April 24, 2024, 12:35:19 AM

Previous topic - Next topic

longfloat

Hey guys, im a cs undergraduate and we are learning about buffer overrun attacks. Im using a shellcode as shown below to overwrite some string literals of a printf in .rodata using mprotect() but i keep getting segmentation fault here:
Program received signal SIGSEGV, Segmentation fault.

[Deleted]

Im suspecting that this has smth to do with the stack pointers but i cant figure what it is yet. Can someone help?

zedd151

What exactly are you trying to do? "shellcode"?
I don't know what either .rodata and mprotect() are... elaborate, please.

This??? mprotect() that is...
I don't speak Linux.
Ventanas diez es el mejor.  :azn:

Biterider

Hi longfloat
Illegal activities such as attacks or exploits are not allowed in this forum.
Please read the forum rules here https://masm32.com/board/index.php?topic=4.0
In particular this one:

QuoteLegality of content
3. Legality of content is not a negotiable matter in the forum. Assembler programming is mainstream programming and is primarily used by professional programmers who require the performance in specialised areas. Low level coding is both allowed and encouraged but there will be no viral or trojan technology allowed including technical data under the guise of AV technology, no cracking and similar activities in the guise of "Reverse Engineering", no hacking techniques or related technology and no support or help with or reference to pirated software. There will also be no links to pages that support or display any of these or any other illegal areas of coding.

Regards, Biterider

longfloat

οκ feel free to take it down

NoCforMe

Assembly language programming should be fun. That's why I do it.

NoCforMe

Quote from: longfloat on April 24, 2024, 12:35:19 AMHey guys, im a cs undergraduate and we are learning about buffer overrun attacks. Im using a shellcode as shown below to overwrite some string literals of a printf in .rodata using mprotect() but i keep getting segmentation fault here:

Could you be kind enough to explain a little more about your interest in buffer overrun attacks? If you've read threads here lately there's been quite a bit of concern over this, and people here are wondering what your motive is for exploring this. From what you wrote it sounds like this is part of a class you're taking; is that so?

Thanks!
Assembly language programming should be fun. That's why I do it.

jj2007

Quote from: NoCforMe on April 25, 2024, 09:47:25 AMCould you be kind enough to explain a

Date registered: April 23, 2024, 03:18:32 PM
Last active: April 23, 2024, 06:59:45 PM

He immediately lost interest. Strange, isn't it?

NoCforMe

Maybe. Or maybe you just scared them off so they'll never set foot here again.
Assembly language programming should be fun. That's why I do it.

jj2007

We had many candidates who were "scared off" as soon as they understood that we wouldn't help them realise their projects :biggrin: