Now that we know we can overwrite our RIP register and our RSP register, we can start designing our exploit and execute

Business, Finance, Economics, Accounting, Operations Management, Computer Science, Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Algebra, Precalculus, Statistics and Probabilty, Advanced Math, Physics, Chemistry, Biology, Nursing, Psychology, Certifications, Tests, Prep, and more.
Post Reply
answerhappygod
Site Admin
Posts: 899603
Joined: Mon Aug 02, 2021 8:13 am

Now that we know we can overwrite our RIP register and our RSP register, we can start designing our exploit and execute

Post by answerhappygod »

Now That We Know We Can Overwrite Our Rip Register And Our Rsp Register We Can Start Designing Our Exploit And Execute 1
Now That We Know We Can Overwrite Our Rip Register And Our Rsp Register We Can Start Designing Our Exploit And Execute 1 (105.84 KiB) Viewed 23 times
Now that we know we can overwrite our RIP register and our RSP register, we can start designing our exploit and execute a new shell (our malicious code). First we need to get a shellcode that allows us to run a shell. Luckily there are many shellcodes we can use that we can find online for exploitation testing. We will use the following shellcode: "\x50\x48\x31\xd2\x48\x31\xf6\x48\xbb\x2f\x62\x69\x6e\x2f\x2f\x73\x68\x53\x54\x5f xb0\x3b\x0f\x05" 1) What is the size of the shellcode in bytes?/ i. This size will be important later for the exploit. Also "\" is an escape sequence and "x" means hexadecimal; therefore, \x31 is a hexadecimal 31. ii. Hint: 1 hexadecimal digit is 4-bit and 1-byte is 8-bits; therefore, how many hexadecimal digits are in 1-byte.
Join a community of subject matter experts. Register for FREE to view solutions, replies, and use search function. Request answer by replying!
Post Reply