|
You are here |
mdanilor.github.io | ||
| | | | |
gebir.ge
|
|
| | | | | [AI summary] The article discusses two methods for modifying the behavior of the `strcmp` function in a program. The first method involves directly patching the binary to change the conditional jump instruction that determines the return value. The second method uses `LD_PRELOAD` to override the `strcmp` function with a custom implementation that inverts the return value of the original function. Both approaches aim to correct the program's incorrect handling of string comparison by reversing the logic of the return value. | |
| | | | |
rog3rsm1th.github.io
|
|
| | | | | Some cool techniques you can use to create SROP exploits | |
| | | | |
www.da.vidbuchanan.co.uk
|
|
| | | | | ||
| | | | |
blog.darkwolfsolutions.com
|
|
| | | September 26, 2024 Episode 15 CVE-2024-45623: Unauthenticated RCE in D-Link DAP-2310 Authors: Hahna Kane Latonick and Jonathan Waterman Dark Wolf Solutions recently disclosed a vulnerability to D-Link that results in unauthenticated remote code execution (RCE) in their DAP-2310 REV-A Wireless | ||