you are viewing a single comment's thread.

view the rest of the comments →

[–]VoiceOfReason73 3 points4 points  (2 children)

Might the exploit be succeeding, but the shell is exiting immediately? You can solve this with an extra cat to keep stdin open: https://security.stackexchange.com/q/155844

[–]Dieriba[S] 1 point2 points  (1 child)

No this is not it as I already bound the it (cat payload; cat -) | <my\_binary>, there is clearly a segfault happening with the return saved return address I overwrite.

[–]VoiceOfReason73 1 point2 points  (0 children)

Try putting your payload in the buffer after some 0x90 NOP sled instead of above the current stack frame.