Hi everyone, Today I will be discussing about exploiting format strings. In case you did not read the 1st part you can read here ( http://oxhat.blogspot.com/2017/12/exploiting-format-string-vulnerability.html ) In this post I will show you how we can exploit format string to write data in memory. Here is a code from a fictitious admin. Please note we have disabled ASLR system wide during this work. The code is self explanatory but still I will give a small overview about it: The code is from a fictitious admin. He has removed the password check and hence the variable called "success" that controls login never gets affected due to it. That means the value of the success variable is always 0. The admin is confident that this will stop unauthorized access to the application. Let us prove him wrong by exploiting it. What will be our attack ? Our attack will be to overwrite the success variable value with some arbitrary value so that the check pass as it will becom
Web - Network - System - Mobile - Cloud - Automotive - Embedded - Internet Of Things (IOT)