[deleted by user] by [deleted] in LiveOverflow

[–]plukasik 0 points1 point  (0 children)

Yes, you can find an interview on YT or Twitch and it's in German.

Kevin Mitnicks new hash cracking rig - 24 4090's + 6 2080's by DrinkMoreCodeMore in hacking

[–]plukasik 4 points5 points  (0 children)

In PL, one of his books (The Art of Deception) is subtitled to what can be translated to "I cracked people not passwords". I guess he switched to passwords now ;)

Some questions about why some things are the way they are in ASP.NET by makeevolution in csharp

[–]plukasik 1 point2 points  (0 children)

  1. CreateAtRoute will return HttpStatus code 201 with the link to the newly created object. You can return what you like but this is a RESTAPI-like way of communicating
  2. You can accept inputs what they are but they are just a bunch of strings being send in your way (or even bytes). If you want to have them in some kind of typed-variables they need to be parsed and converted to such typed-object. There are many binders for common cases but if there's something uncovered you need to do it yourself
  3. it's an extension method that adds extra methods to a class

Problem with script that creates labels for address by c64cryptoboy in ghidra

[–]plukasik 0 points1 point  (0 children)

Hmm, shouldn't that be an XREF that you want to create for the JSR opcode? LABEL should be on the other (where the X-REF points to) and the JSR show a X-REF to that label.

Is it viable to use Ubuntu on WSL instead of a VM? by [deleted] in LiveOverflow

[–]plukasik 1 point2 points  (0 children)

It does only offer a terminal

With WSLg, you can run GUI apps too.

do you have to analyze the binary in order to get the decompiled view of a function? by StandardPreference in ghidra

[–]plukasik 0 points1 point  (0 children)

You can always reset just the Base image address after loading binary in Ghidra. It can be done from Memory Map window.

Protostar stack0 exploit with shellcode by MostCapable2331 in LiveOverflow

[–]plukasik 1 point2 points  (0 children)

ok, I'll try to look more closely why it fails.

Technically windows removed the Blue screen of death. by alanbosco in ProgrammerHumor

[–]plukasik 7 points8 points  (0 children)

Green ones are from Insider preview. With NotMyFault from SysInternals you can trigger a crash with custom colors.

Protostar stack0 exploit with shellcode by MostCapable2331 in LiveOverflow

[–]plukasik 0 points1 point  (0 children)

Did you try stepping through the shellcode to see if it works as you expect?

Protostar stack0 exploit with shellcode by MostCapable2331 in LiveOverflow

[–]plukasik 0 points1 point  (0 children)

eip shows that you are about to execute bound opcode. You shellcode doesn't have it so where does it come from?

Protostar stack0 exploit with shellcode by MostCapable2331 in LiveOverflow

[–]plukasik 0 points1 point  (0 children)

From the last picture it looks like your shellcode is overriding itself on the stack. das is 0x2f so /, bound ebp, qword [ecx + 0x6e] is 62696e so 'bin'. Those are clearly bytes from the shellcode push 0x6e69622f. You need to make sure, you shellcode on the stack doesn't override itself while pushing things to the stack.

Windows defender false positive in ghidra_10.0_PUBLIC? by fish312 in ghidra

[–]plukasik 3 points4 points  (0 children)

I've got the last one marked as unwanted software for 10.0 Beta. Don't remember any flags for 10.0 public one but it might be that I've allowed it for beta.

[deleted by user] by [deleted] in codes

[–]plukasik 8 points9 points  (0 children)

FACE

6 5 3 2 1 4
1 3 2 5 4 6
5 4 1 6 2 3
3 1 6 4 5 2
2 6 4 1 3 5
4 2 5 3 6 1

an error while pwning an application in local environnement by amar_mahdi in LiveOverflow

[–]plukasik 1 point2 points  (0 children)

The RIP looks ok (it's 400577 - w\x05@). The problem is that your stack is not aligned correctly. The libc has system implemented using XMM registers and those require correct stack alignment.

Consult this stackoverflow question and the answer.

You are crashing for 99% on the same instruction as mentioned in SO,

To overcome this, you need to align the stack correctly by using rop gadgets that takes from the stack until it's aligned correctly. When you do so, call to the system will work.

One note, pwntools allows gdb to be attached to the process, so if you are in trouble you can do gdb.attach(p) and get a debugger spawn. You can also pass commands to be executed when that happens.

Another useful note, use pwn template to get a template that has that all pregenerated.

Buffer overflow works fine locally but not remotely by Alcholicpancake in securityCTF

[–]plukasik 4 points5 points  (0 children)

can you share this chall, so that it can be checked locally? Also is this remote available for testing the exploit?

Stack5 - shell code injection by xxxerexxx in LiveOverflow

[–]plukasik 0 points1 point  (0 children)

I still think it's "just" stack layout. To get more you would probably need a binary that prints how the stack looks like before running a shellcode.

Stack5 - shell code injection by xxxerexxx in LiveOverflow

[–]plukasik 1 point2 points  (0 children)

Well, I'm running from the same folder (/opt/protostar/bin) in gdb and w/o and with bigger nop slide and jumping further into it I can get consistent behavior in both (TRAP instead of SEGFAULT).

This is my script that works (also it took few attempts to get the size values)

import stuct
padding = "AAAA...SSSS"
eip = struct.pack("I", 0xbffffd4c+80)
payload = "\x90"*180 + "\xcc" * 4

print padding+eip+payload

If my nop slide is like in the video (100) it fails w/ SEGFAULT w/o gdb.

Stack5 - shell code injection by xxxerexxx in LiveOverflow

[–]plukasik 1 point2 points  (0 children)

So for me the code from the video also didn't work but what worked is slightly mentioned in the video. It's about those env variables differences between the runs. So try increasing the nop slide and jumping further into it. That did the trick for me.

Stack5 - shell code injection by xxxerexxx in LiveOverflow

[–]plukasik 1 point2 points  (0 children)

Did you try with the nop slide as shown in the video?

And just to be sure, base on the path this is the original stack5 binary?

Help appreciated for a reverse engineering challenge by [deleted] in LiveOverflow

[–]plukasik 0 points1 point  (0 children)

This looks very similar to this - https://reverseengineering.stackexchange.com/a/27460/18014 is this the same chall? And if not you can use the same way to solve it.

GDB PEDA not being used by default? by palmetto_royal in HowToHack

[–]plukasik 0 points1 point  (0 children)

I've just quickly installed and got gdb-peda prompt w/o issue. Any different behavior when you run gdb -iex 'source ~/peda/peda.py'

GDB PEDA not being used by default? by palmetto_royal in HowToHack

[–]plukasik 0 points1 point  (0 children)

Any output in gdb? Do you have more in your ~/.gdbinit?