1. We have moved from vBulletin to XenForo and you are viewing the site in the middle of the move. Though the functional aspect of everything is working fine, we are still working on other changes including the new design on Xenforo.
    Dismiss Notice

Stack Buffer OverFlow

Discussion in 'C' started by micsom_micsom, Oct 28, 2009.

  1. micsom_micsom

    micsom_micsom New Member

    i was just going through one of the articles and i thought about trying this

    char *pEvil="zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz";

    int main(){
    char Good[2];
    strcpy(Good,pEvil);
    return 1;
    }

    this will crash saying that it is unable to access the memory whose location is "zzzz" in hexa(This is the expected)..i was just trying to figure out how the ESP and EBP is getting Corrupted here...

    can any1 plzz explain..:charming:
     
  2. xpi0t0s

    xpi0t0s Mentor

    Compile to assembly and you'll see exactly what is going on.
     
  3. micsom_micsom

    micsom_micsom New Member

    i am Using Dev c++, i can't find any option to see the assembly Code ...
     
  4. xpi0t0s

    xpi0t0s Mentor

    "-o source.s" might do the trick. I don't know, I use Visual Studio.
    Alternatively if you build the program, start it in debug mode and put a breakpoint on the first line of code, is there a "view assembler" option in the debugger?
     
  5. micsom_micsom

    micsom_micsom New Member

    No such options ...
     

Share This Page