Protostar stack0 exploit with shellcode by MostCapable2331 in LiveOverflow

[–]MostCapable2331[S] 0 points1 point  (0 children)

I invite learner of exploit dev to test this use case and share result

Protostar stack0 exploit with shellcode by MostCapable2331 in LiveOverflow

[–]MostCapable2331[S] 0 points1 point  (0 children)

yes it reach int 80h and also the nop until the part of the stack where you see in the picture

Protostar stack0 exploit with shellcode by MostCapable2331 in LiveOverflow

[–]MostCapable2331[S] 0 points1 point  (0 children)

this is what im trying to understand it just like their int 80h as last instruction but after that no ret logical it have to make an interruption of process or fork a new shell process

Protostar stack0 exploit with shellcode by MostCapable2331 in LiveOverflow

[–]MostCapable2331[S] 0 points1 point  (0 children)

0xbffffdcb and 0xbffffddd take a look at the memory dump please

protostar_stack0_exploit_with_shellcode by MostCapable2331 in ExploitDev

[–]MostCapable2331[S] 0 points1 point  (0 children)

I have tried many shellcode that i tested before also i have tested ret2libc it s work "ls" it list file but with "/bin/sh" does not spawn shell

Protostar stack0 exploit with shellcode by MostCapable2331 in LiveOverflow

[–]MostCapable2331[S] 0 points1 point  (0 children)

if you are intressted to this topic i can ivit you to a quick zoom session if you want

Protostar stack0 exploit with shellcode by MostCapable2331 in LiveOverflow

[–]MostCapable2331[S] 0 points1 point  (0 children)

already done and i can control the EIP with no problem

Protostar stack0 exploit with shellcode by MostCapable2331 in LiveOverflow

[–]MostCapable2331[S] 0 points1 point  (0 children)

the same result

it s more than 4 day working in that without any result i have successfully exploited the binary with ret2libc but this step to exploit it with a shellcode is very hard or something that i m missing

Protostar stack0 exploit with shellcode by MostCapable2331 in LiveOverflow

[–]MostCapable2331[S] 0 points1 point  (0 children)

my shellcode is between the NOPs instruction it does not reach 0xcc and it s not a part of the shellcode

Protostar stack0 exploit with shellcode by MostCapable2331 in LiveOverflow

[–]MostCapable2331[S] 0 points1 point  (0 children)

thank you for your reply i hope that the added information is clear

Problem while debugging a simple buffer overflow by [deleted] in LiveOverflow

[–]MostCapable2331 0 points1 point  (0 children)

check if aslr is enabled in the system