Quantcast
Channel: Knowledge Junk » exploit
Browsing latest articles
Browse All 3 View Live

Image may be NSFW.
Clik here to view.

Buffer Overflowing Target 0

target0.c #include <stdio.h> #include <stdlib.h> #include <string.h> int bar(char *arg, char *out) { strcpy(out, arg); return 0; } int foo(char *argv[]) { char buf[128]; bar(argv[1],...

View Article



Image may be NSFW.
Clik here to view.

Buffer Overflowing Target 2

target2.c #include <stdio.h> #include <stdlib.h> #include <string.h> void nstrcpy(char *out, int outl, char *in) { int i, len; len = strlen(in); if (len > outl) len = outl; for (i...

View Article

Image may be NSFW.
Clik here to view.

Buffer Overflowing Target 6

target6.c #include <stdio.h> #include <stdlib.h> #include <string.h> int foo(char *arg) { char buf[288]; snprintf(buf, sizeof buf, arg); return 0; } int bar(char *argv[]) {...

View Article
Browsing latest articles
Browse All 3 View Live




Latest Images