• Log In
↓ Skip to Main Content

Bazz's Code Developments

Main Navigation

  • Home
Home › 2014 › Page 3

Year: 2014

PREFACE – Hacking UMB’s CS Apply program

By michaelbazzinott001 Posted on October 22, 2014 Posted in Uncategorized No Comments

This page serves as a preface to the 11-part series of research I have written directly to blog. There is an ‘apply’ program in the Computer Science (CS) department at my university, University of Massachusetts Boston. This program allows students,faculty,staff,alumni,and …

PREFACE – Hacking UMB’s CS Apply program Read more »

Hacking Blade60 — Pt. XI

By michaelbazzinott001 Posted on October 21, 2014 Posted in Uncategorized No Comments

some output that might be helpful In hindsight, a really helpful ability would be more dynamic code, such that fsf has a variable identifying where in the buffer it is.. Something more variable..

The Big One – Pt. X

By michaelbazzinott001 Posted on October 20, 2014 Posted in Uncategorized No Comments

I studied the stack frames more… You can return from buffer overflow into a code segment with a ret restore. you can set %fp to a fake stack frame with fake” %i and %l registers. This “fake” %i7 points to …

The Big One – Pt. X Read more »

Stack Frame Search – Pt. IX

By michaelbazzinott001 Posted on October 19, 2014 Posted in Uncategorized No Comments

Find out if char* strings need to be word-aligned. NO, they do not ;) GREAT, cause that helps ALOT This is a breakpoint of the 2nd ShowParams function call in Groups(), illustrating the stack frame: I started marking several values …

Stack Frame Search – Pt. IX Read more »

Memory Disclosure Pt. VIII

By michaelbazzinott001 Posted on October 17, 2014 Posted in Asm, buffer overflow, C, Sparc/Solaris, Uncategorized No Comments

This might be useful as some sort of binary signature in System(). /var/adm/messages is where the stack-execution notice comes up. I don’t know if the SIGPIPE error could possibly produce a message in /var/adm/messages, or some other log?? let’s see…. …

Memory Disclosure Pt. VIII Read more »

Smashing the Stack+Data sections PT. VII

By michaelbazzinott001 Posted on October 17, 2014 Posted in Asm, buffer overflow, C, Sparc/Solaris, Uncategorized No Comments

Remote Info. Disclosure for LibC Today, I am seeking information disclosure through a global variable buffer overflow, which conveniently overflows into a long chain of data structures purely char* . I use this technique I am developing to obtain disclosure …

Smashing the Stack+Data sections PT. VII Read more »

Hacking Apply — Pt. VI

By michaelbazzinott001 Posted on October 16, 2014 Posted in Asm, buffer overflow, C, Sparc/Solaris, Uncategorized No Comments

./pty_apply_final is my latest pty program :) uses CTRL-S to fluctuate around the stack space, starting from the middle and then alternating up and down the size of the NOPsled -16 for being safe. works on Blade72 with the following …

Hacking Apply — Pt. VI Read more »

Peal — Hacking Apply – pt IV hidden PTY code

By michaelbazzinott001 Posted on October 15, 2014 Posted in Uncategorized No Comments

Hacking Apply – Pt. V

By michaelbazzinott001 Posted on October 15, 2014 Posted in Asm, Bash, buffer overflow, C, Sparc/Solaris, Uncategorized No Comments

crucial address: right after the gets() in Acct: 0x11518 The exploit wasn’t working. The segfault was caused by another thing. Reg mess. Luckily, the only reg we need to restore to normal is %o3 must put a good value into …

Hacking Apply – Pt. V Read more »

Pearl — Hacking Apply — pt. IV

By michaelbazzinott001 Posted on October 15, 2014 Posted in Asm, buffer overflow, C, Sparc/Solaris, Uncategorized No Comments

So had previously showed the filling of the buffer with 0x41 but that doesn’t help us locate any offset into the buffer. this will: [[[hidden PTY code]]] That code is stripped from an old version of a userspace keylogger I …

Pearl — Hacking Apply — pt. IV Read more »

Posts pagination

Previous 1 2 3 4 5 6 Next
Copyright © 2025 Bazz's Code Developments | Powered by Responsive Theme