writing shellcode: why my shellcode won't work?

I'm currently writing a shellcode that exploit a target program that uses the puts function. The program looks like this: #include <stdio.h> main() { char buf[123]; ...

iReport 5.5.0 won't start

I want to use iReport on ubuntu 12.04. When I try to start it, it stands still and just gives me this error: Java HotSpot(TM) 64-Bit Server VM warning: You have loaded library...

Stack guard might have disabled?

I am trying to run the first example in rootbeer library, which you can find from here. The issue is, even though I followed all of their instructions, I am getting the following message when I am...

Hadoop error in shuffle in fetcher: Exceeded MAX_FAILED_UNIQUE_FETCHES

I am new to hadoop. I have a kerberos security enabled hadoop cluster (master and 1 slave) set up on a virtual box. I am trying to run a job from the hadoop examples 'pi'. The job terminates with...

OpenJDK 64-Bit Server VM warning: You have loaded library which might have disabled stack guard

can any one help me with this error message . while try to compile project in eclipse using jNetpcap API I followed all the steps mentioned on the website below ,how to setup the environment on...

BufferOverflow shell not spawn

I'm trying a buffer overflow on a simple program #include <stdio.h> int main(int argc, char **argv) { char buf[8]; gets(buf); printf("%s\n", buf); return 0; ...

Buffer Overflow - Guessing the right offset does not work correctly

to understand the buffer overflow concept I write a little code, called overflow.c: #include <stdio.h> #include <string.h> int main(int argc, char *argv[]){ char buffer[100]; if(argc >...

Compiling C with JNI for Raspberry Pi 2 (wrong ELF class)

I am trying to compile basic C code with JNI for Rpi2. I was trying to do it directly in rpi with GCC. I have tried many different switches, but nothing is working and I am still getting: Java...

Loopback error - value is not an object

I am using loopback in backend. I am getting this error Unhandled error for request POST /api/meetups/auth: Error: Value is not an object. at errorNotAnObject...

WARNING: An illegal reflective access operation has occurred (portable opencv in java)

I want to make a portable opencv application which the dependency is added to maven file pom.xml. Simplified code is : import org.opencv.core.Mat; public class Builder { public static void...

Assembly version of C code to launch a shell

In buffer overflow assignment, I got a C file (call_shellcode.c) which contains an assembly version of the following C code which executes to open a shell: #include <stdio.h> #include...

Differences in disassembling 32 bit and 64bit

I started my adventure with reverse engineering but I have some problems which I can't solve from the very beginning. I'm following tutorials on YT and I meet some differences. So, when I work...

Exactly what cases does the gcc execstack flag allow and how does it enforce it?

I have some example code here which I'm using to understand some C behaviour for a beginner's CTF: // example.c #include <stdio.h> void main() { void (*print)(); print =...

ld.exe: unrecognized option '-z'

I followed this Buffer Overflow Exploit tutorial and wrote a small application to compile with gcc in my mingw32.exe. However, when I did, I got the following errors: [email protected]

How to perform a simple buffer_overflow attack?

I have tried such an attack thousands of times but all fail and end with the same problem. I have posted the code for my bufferoverflow.c program. I have compiled it with gcc along with the...

Can't Get Root Shell on Buffer Overflow Assignment

I am working an assignment (see http://www.cis.syr.edu/~wedu/seed/Labs_12.04/Software/Buffer_Overflow/) and, when I run ./stack I end up with Trace/breakpoint trap instead of the root shell. The...

Add SmartID Reader JNI library into existing gradle project

I'm trying to use Smart IDReader SDK trial version (https://habr.com/en/company/smartengines/blog/332670/) in my existing project with Gradle (project assembled into war-archive). The app...

How to fix OpenJDK 64-Bit OpenJDK 64-Bit Server VM warning and Disable stack guard

It's my first time compiling a flutter project on ParrotSec under KDE and i got this error I try to uninstall openJDK and installed jdk from oracle and my echo $JAVA_HOME output is...

sh: 1: Syntax error: Unterminated quoted string -- Shellcode

I am currently reading Jon Erickson's book "Hacking: The Art of Exploitation, 2nd Edition" and I am stuck on a problem concerning an exploitation of a buffer overflow. Firstly, we have a code of...

Buffer Overflow Attack doesn't work on Ubuntu 20.04

I'm trying to do a Buffer Overflow attack on a simple C program that takes a buffer and print it. I've tried many combinations but at the end, when I try to execute my shellcode, I always get...

When setting execution bit on PT_GNU_STACK program header, why do all segments of the process become executable

Playing around with controlling the executable-bit on segments, I've found a massive quirk in how PT_GNU_STACK is used by the loader. According to the elf(5) manpage, PT_GNU_STACK is used as...

Why do I get a segmentation fault in the exploit_notesearch program from "Hacking: The Art of Exploitation"?

So, to start off with, I am on Kali 2020.1, fully updated. 64 bit. The source code is as follows: #include <stdio.h> #include <stdlib.h> #include <string.h> #include <sys/stat.h> #include...

Buffer Overflow - Finding EIP

I am on Linux kali 5.6.0-kali2-amd64 #1 SMP Debian 5.6.14-1kali1 (2020-05-25) x86_64 GNU/Linux and I am learning to exploit buffer overflows vulnerabilities so I'm quite bad at doing it yet, so...

Issues with onnxruntime on Ubuntu 16.04

I'm trying to run inference on an ONNX model on Ubuntu 16.04 using onnxruntime. But the import statement gives me this error: >>> import...

Unable to execute assembly code located in the program's data segment in WSL

This program overrides the return address of the main function to point to a character array of encoded x86-64 assembly instructions. The instructions simply encode a NOP followed by the syscall...

Why I cannot execute a shellcode stored in an environment variable?

Why I cannot execute a shellcode stored in an environment variable?? Problems I am trying to execute a shellcode stored in an environment variable by buffer overflow with reference to Hacking: The...

Error running PySpark code in Jupyter Notebook on RaspberryPi Cluster with Hadoop/Spark/Yarn

I'm trying to run example code in Jupyter Notebook with PySpark using Yarn cluster. I think my cluster works fine. I can see all nodes running yarn node -list -all OpenJDK Client VM warning: You...

Linux default behavior of executable .data section changed between 5.4 and 5.9?

Story Case 1 I accidentally wrote my Assembly code in the .data section. I compiled it and executed it. The program ran normally under Linux 5.4.0-53-generic even though I didn't specify a flag...

execute a shellcode, /bin/sh

I am trying, unsuccessfully, to execute shellcode (/bin/sh) from an address on the stack. I Inject the shellcode to an executable file using a buffer overflow method on an Ubuntu 20.04 64-bit...

Building Glibc 2.33 for Linux results in unit test failures

I'm currently trying to create a build of Glibc 2.33 to live in parallel to the default system version, but the build process is resulting in a large number of unit test failures. While some of...