Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| en:it-security:blog:buffer_overflow_x64 [2024/04/14 10:45] – psycore | en:it-security:blog:buffer_overflow_x64 [2024/08/02 10:31] (current) – psycore | ||
|---|---|---|---|
| Line 3: | Line 3: | ||
| ====== Buffer overflow in the 64-bit stack - part 1 ====== | ====== Buffer overflow in the 64-bit stack - part 1 ====== | ||
| - | In this tutorial, we will create a buffer overflow on the 64-bit stack to gain root privileges. erlangen.((https:// | + | In this tutorial, we will create a buffer overflow on the 64-bit stack to gain root privileges.((https:// |
| - | Technical details on buffer overflows, stack etc. can be found at hier((https:// | + | Technical details on buffer overflows, stack etc. can be found here((https:// |
| \\ | \\ | ||
| \\ | \\ | ||
| ===== Dependencies ===== | ===== Dependencies ===== | ||
| + | |||
| + | {{page> | ||
| {{page> | {{page> | ||
| Line 22: | Line 24: | ||
| ==== gdb-peda Exploit Tools ==== | ==== gdb-peda Exploit Tools ==== | ||
| - | gdb-peda extends the debugger GDB with helpful commands to exploit | + | gdb-peda extends the debugger GDB with helpful commands to exploit.((https:// |
| <code bash> | <code bash> | ||
| Line 204: | Line 206: | ||
| ==== Attack ==== | ==== Attack ==== | ||
| - | First we set root rights to the vulnerable file and start diese((https:// | + | First we set root rights to the vulnerable file and start it((https:// |
| <code bash> | <code bash> | ||