Linux 64 bit Stack overflow exploit.

The buffer overflow happens when there is insufficient bound checks. When the malformed data written to a buffer-space, it overflows and corrupts the adjacent memory  values. I had to disable ASLR and compile the vulnerable c program with no stack protection and make the stack executable for this simple proof of concept. Here is a quick time-lapse(not too fast, just 1.75 times faster) video of the full exploit dev from scratch, h4v3 fun.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s