Skip to main content

Questions tagged [binary-code]

-1 votes
1 answer
295 views

I started reading "Hacking, The Art of Exploitation" and I am confused about some things regarding memory examination. When I disassemble main, I get an output of all memories where the ...
jprossv's user avatar
0 votes
1 answer
744 views

I'm doing a binary challenge from pwnable.kr and I'm examining a some ROP gadget. Until now I've always used gadget ending with ret or syscall/int 0x80, but now ROPgadget gave me a gadget ending with ...
Marco Balo's user avatar
1 vote
1 answer
618 views

Excuse the naive question but I'm trying to understand a bit about security in home health and medial devices and a recent report about how home Covid test results can be altered has left me a bit ...
orome's user avatar
  • 333
-1 votes
1 answer
1k views

I have come across a lot of guides and blogs about reverse engineering where they use labs to teach various techniques and methods to break binaries. My question is what actual use cases does reverse ...
Abhinav Vasisth's user avatar
0 votes
0 answers
31 views

The thing that helped me to understand what is a "public key" was to parallel it with a door lock: The door lock is public in the sense that anyone can try to unlock it and the door key is ...
humble-learner's user avatar
0 votes
1 answer
361 views

This question is about if any technologies used by a web browser (HTTP, TCP, JavaScript, etc.) can be used to push a binary file from the web server to a random folder on the client. This is for a ...
user avatar
1 vote
1 answer
250 views

I am pentesting a web application. It makes a backend call to another application, and I am trying to hijack that call. I have gained control over the URL path, query parameters, and fragment that is ...
Bob's user avatar
  • 99
0 votes
0 answers
546 views

I have a C code project, I want to use .so lib to verify certificate for valid. I know there is a way to crack .so file by using below tools: 1.IDA_Pro_v6.8_and_Hex-Rays_Decompiler_ 2.WinHex 3....
244boy's user avatar
  • 935
2 votes
1 answer
473 views

Using standard hardening options like PIC, Stack Protection ... does a mere recompilation make a program more secure against attacks? You have the source code of a program, compile it two times with ...
plsrespond's user avatar
0 votes
1 answer
178 views

Discussion under this answer in Space Exploration SE links to items in NAIF; NASA Planetary Data System Navigation Node links for MacIntel_OSX_64bit I'm looking at these two. spy: https://naif.jpl....
user avatar
1 vote
0 answers
487 views

The challenge data is: ...
CtfLover's user avatar
0 votes
1 answer
153 views

I (will) have a binary executable file. It's only permission is user-execute. It cannot be read by user, group, or world. The owner of the file is the Apache user. I don't want the apache user to be ...
Reed's user avatar
  • 105
2 votes
0 answers
189 views

Kernels like linux-libre (standard in Debian and other free Linux distributions) ship no binary firmware packages by default. From my limited understanding of their functionality, a binary firmware ...
Prototype700's user avatar
1 vote
1 answer
2k views

I'm learning about format string exploits, and am attempting to use one on an example program to overwrite the .fini_array section in virtual memory with a stack address containing shellcode (and ...
Atticus Stonestrom's user avatar
9 votes
0 answers
2k views

My question is about the use of ultrasonic messages that are part of the modern advertising ecosystem and are also used by the Google Nearby Messages API. When it comes to advertising, the type of ...
user100487's user avatar

15 30 50 per page