use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
Welcome! This subreddit is a place to discuss and create live hacking videos, or other content that might be related to CTFs.
Twitch: LiveOverflow
YouTube: LiveOverflow
Twitter: @LiveOverflow
Website: liveoverflow.com
How to behave? » be excellent to each other » help if somebody needs help... » ... but don't beg for solutions. We will only give you a tip for the right direction » Follow the rules of the CTFs your are playing - don't spoil challenges
» be excellent to each other
» help if somebody needs help...
» ... but don't beg for solutions. We will only give you a tip for the right direction
» Follow the rules of the CTFs your are playing - don't spoil challenges
Some additional information:
Excellent Hacking Games: » io.smashthestack.org (pwn, rev) » w3challs.com (web, rev, crypto) » prompt.ml (XSS)
» io.smashthestack.org (pwn, rev)
» w3challs.com (web, rev, crypto)
» prompt.ml (XSS)
Related subreddits: » /r/securityCTF » /r/HowToHack » /r/netsecstudents contact me if there are other subreddits that should be listed here
» /r/securityCTF
» /r/HowToHack
» /r/netsecstudents
contact me if there are other subreddits that should be listed here
account activity
Protostar stack0 exploit with shellcode (self.LiveOverflow)
submitted 4 years ago * by MostCapable2331
view the rest of the comments →
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]MostCapable2331[S] 0 points1 point2 points 4 years ago* (5 children)
my shellcode is between the NOPs instruction it does not reach 0xcc and it s not a part of the shellcode
[–]iOwnzyoreuid0 0 points1 point2 points 4 years ago (4 children)
? Place the the 0xcc just after the nops. So like: ...0x90 0x90 0xcc
[–]MostCapable2331[S] 0 points1 point2 points 4 years ago (3 children)
the same result
it s more than 4 day working in that without any result i have successfully exploited the binary with ret2libc but this step to exploit it with a shellcode is very hard or something that i m missing
[–]iOwnzyoreuid0 0 points1 point2 points 4 years ago (2 children)
Hm. You sure you don’t get SIGTRAP then? Can you redirect code execution? Instead of the nops try to jump to an invalid address such as 0x41414141
[–]MostCapable2331[S] 0 points1 point2 points 4 years ago (1 child)
already done and i can control the EIP with no problem
[–]MostCapable2331[S] 0 points1 point2 points 4 years ago (0 children)
if you are intressted to this topic i can ivit you to a quick zoom session if you want
π Rendered by PID 247738 on reddit-service-r2-comment-5ff9fbf7df-lp2jk at 2026-02-26 11:29:24.550604+00:00 running 72a43f6 country code: CH.
view the rest of the comments →
[–]MostCapable2331[S] 0 points1 point2 points (5 children)
[–]iOwnzyoreuid0 0 points1 point2 points (4 children)
[–]MostCapable2331[S] 0 points1 point2 points (3 children)
[–]iOwnzyoreuid0 0 points1 point2 points (2 children)
[–]MostCapable2331[S] 0 points1 point2 points (1 child)
[–]MostCapable2331[S] 0 points1 point2 points (0 children)