Skip to content

Vulnerability to execute a program from a memory overflow on Windows XP for 42 Madrid Cybersecurity Bootcamp.

Notifications You must be signed in to change notification settings

rcabezas29/tsunami

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 

Repository files navigation

TSUNAMI

The aim of this project is to create a buffer overflow with the strcpy function as it is not protected and exploit this to execute a program the memory.

I have inserted a string bigger 4 byte bigger than the buffer into another program to access the return function of the vulnerable program.

Inside the string there is a shellcode that will be executed with the return function of the vulnerable program.

You may know where is the address where the buffer starts and that the address of the return is 4 byte away from the stack variables.

It is developed on a Windows XP VM. Developed on Vagrant.

About

Vulnerability to execute a program from a memory overflow on Windows XP for 42 Madrid Cybersecurity Bootcamp.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published