Content in vulnerability string attack
up vote
0
down vote
favorite
I am learning about format string attack and am struggling to understand how the string before the format string overwrites the content of an address.
I am reading from a great article: http://www.cis.syr.edu/~wedu/Teaching/cis643/LectureNotes_New/Format_String.pdf
I understand that if the user have control over the variable to be printed in printf such as
printf (Uservariable);
the user can opt to not pass in variables after format strings and change the content of the address using strings such as
printf ("x10x01x48x08 %x %x %x %x %s");
However from the diagram below, 0x10014808 is concat into an address when it should be in the white spaces shown below.
How does %x pushes all the numbers together to form the address to overwrite %s?
c security printf exploit
add a comment |
up vote
0
down vote
favorite
I am learning about format string attack and am struggling to understand how the string before the format string overwrites the content of an address.
I am reading from a great article: http://www.cis.syr.edu/~wedu/Teaching/cis643/LectureNotes_New/Format_String.pdf
I understand that if the user have control over the variable to be printed in printf such as
printf (Uservariable);
the user can opt to not pass in variables after format strings and change the content of the address using strings such as
printf ("x10x01x48x08 %x %x %x %x %s");
However from the diagram below, 0x10014808 is concat into an address when it should be in the white spaces shown below.
How does %x pushes all the numbers together to form the address to overwrite %s?
c security printf exploit
add a comment |
up vote
0
down vote
favorite
up vote
0
down vote
favorite
I am learning about format string attack and am struggling to understand how the string before the format string overwrites the content of an address.
I am reading from a great article: http://www.cis.syr.edu/~wedu/Teaching/cis643/LectureNotes_New/Format_String.pdf
I understand that if the user have control over the variable to be printed in printf such as
printf (Uservariable);
the user can opt to not pass in variables after format strings and change the content of the address using strings such as
printf ("x10x01x48x08 %x %x %x %x %s");
However from the diagram below, 0x10014808 is concat into an address when it should be in the white spaces shown below.
How does %x pushes all the numbers together to form the address to overwrite %s?
c security printf exploit
I am learning about format string attack and am struggling to understand how the string before the format string overwrites the content of an address.
I am reading from a great article: http://www.cis.syr.edu/~wedu/Teaching/cis643/LectureNotes_New/Format_String.pdf
I understand that if the user have control over the variable to be printed in printf such as
printf (Uservariable);
the user can opt to not pass in variables after format strings and change the content of the address using strings such as
printf ("x10x01x48x08 %x %x %x %x %s");
However from the diagram below, 0x10014808 is concat into an address when it should be in the white spaces shown below.
How does %x pushes all the numbers together to form the address to overwrite %s?
c security printf exploit
c security printf exploit
asked Nov 11 at 16:48
Bloopie Bloops
46021135
46021135
add a comment |
add a comment |
active
oldest
votes
active
oldest
votes
active
oldest
votes
active
oldest
votes
active
oldest
votes
Thanks for contributing an answer to Stack Overflow!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Some of your past answers have not been well-received, and you're in danger of being blocked from answering.
Please pay close attention to the following guidance:
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53250963%2fcontent-in-vulnerability-string-attack%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown