Overflow in Code ?
Page 1 of 2 12 LastLast
Results 1 to 10 of 11

Thread: Overflow in Code ?

  1. #1
    Junior Member
    Join Date
    Jan 2008
    Posts
    6

    Overflow in Code ?

    hello AO ppl ,

    saw this on a University's site...its meant for beginners...

    i have been trying to make a sense of this encrypted text but cannot make much sense outta it...
    what i have figured out is that the english letters in the code are from the HEX Family.. i hv tried to get an o/p from a HEX to ASCII convertor but didnt help..
    so any suggestions from codebreakers??


    1. Analyze this : Analyze that
    68412b4a0ca6f15742433078890f619e : d523cac48e53a72e25c0efd4ca43b35585f20f63
    Crack the code and find out what I am trying to tell you.
    Hint: It is not as simple as you think. But then I may be confusing you.



    I could solve around 6 out of TASK 1...task 2 and 3 still to go. fairly easy.. what about you guys? have a look at the whole page here...

  2. #2
    Junior Member
    Join Date
    Jan 2008
    Posts
    6

    Smile Code Vulnerable?

    can anyone give me a few inputs on the code written below being vulnerable? if yes then how can somebody exploit it>


    int some_function(int x, int y, int z)
    {
    char buff[5];
    gets(buff);
    return 0;
    }
    int main()
    {
    some_function(10,15,20);
    return 0;
    }




    -thanks

  3. #3
    Junior Member
    Join Date
    Jan 2008
    Posts
    6

    Exclamation PHP security challenge !help

    i stumbled upon a hacking challenge online in which you are supposed to find vuln and break-into the authenticiation system

    http://www.bits-quark.org/binary/task1.html


    i have gone through other challenges but this one is boggling me the most

  4. #4
    Senior Member nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,190
    What exactly is giving you the problem my little friend?

    Q: What beats 4 aces in a game of straight draw poker?
    A: A Smith & Wesson


  5. #5
    Junior Member
    Join Date
    Jan 2008
    Posts
    6
    hello nihil,

    how did you manage to solve that code so fast??? share the algorithm with me

    thanks a lot.!

    and hats off to AO

  6. #6
    Junior Member
    Join Date
    Jan 2008
    Posts
    6
    funny situation
    is "Q: What beats 4 aces in a game of straight draw poker?
    A: A Smith & Wesson"

    the answer to the code mentioned on the URL or a proverb you're pointing to me ? :P

    I'll repeat the problem

    Q: Analyze this : Analyze that
    68412b4a0ca6f15742433078890f619e : d523cac48e53a72e25c0efd4ca43b35585f20f63
    Crack the code and find out what I am trying to tell you.
    Hint: It is not as simple as you think. But then I may be confusing you.

  7. #7
    Junior Member
    Join Date
    Jan 2008
    Posts
    6

    Thumbs up Overflow in Code ?

    Hi AO community,

    I found these problems in a security quiz online... any help with the answer?



    Maria’s friend Anna is not a very good coder. Maria came across the following code written by Anna and knows that it is vulnerable. Help her identify this vulnerability and teach her how to exploit it.

    Code:
     int 
    some_function
    (int x, int y, int z) 
    {
     char buff[5];
     gets(buff); 
    return 0;
     }
     int main() 
    { 
    some_function(10,15,20);
     return 0; }



    2. She came across the following exploit for executing commands on a remote machine that hosts "some_website" on a vulnerable web server:

    http://some_website/scripts& /..%%35%64..%%35%64..%%35%64
    ..%%35%64..%%35%64../winnt/system32/cmd.exe?/d+dir+d:


    Help her identify the webserver and its version and explain to her how the exploit works. Also teach her how to exploit this vulnerability for copying files, deleting them, disabling logging and deleting old logs on the remote server.




    wow. the first one seems a little hard... second one can be googled though

  8. #8
    Junior Member
    Join Date
    Jan 2008
    Posts
    2

    man help

    yu in online hacking competition na? i need username for 12th level

  9. #9
    Banned
    Join Date
    Aug 2001
    Location
    Yes
    Posts
    4,424
    I merged all these "I'm too lazy to figure it out myself, so I'm just going to ask people to give me the answer" threads into one.

  10. #10
    Senior Member
    Join Date
    Dec 2003
    Posts
    137
    Analyze this : Analyze that
    68412b4a0ca6f15742433078890f619e : d523cac48e53a72e25c0efd4ca43b35585f20f63
    Crack the code and find out what I am trying to tell you.
    Hint: It is not as simple as you think. But then I may be confusing you.
    Looks like a MD5 hash. I could be wrong.
    Life is a shipwreck but we must not forget to sing in the lifeboats. ~Voltaire

Similar Threads

  1. Decompiling .net and code obfuscation
    By Juridian in forum The Security Tutorials Forum
    Replies: 3
    Last Post: February 12th, 2006, 04:40 PM
  2. Network Security made easy?
    By Tiger Shark in forum Microsoft Security Discussions
    Replies: 5
    Last Post: January 14th, 2005, 08:47 PM
  3. C++ portability guide
    By tampabay420 in forum Programming Security
    Replies: 2
    Last Post: February 14th, 2003, 02:36 PM
  4. Replies: 1
    Last Post: July 15th, 2002, 04:46 AM
  5. The Worlds Longest Thread!
    By Noble Hamlet in forum AntiOnline's General Chit Chat
    Replies: 1100
    Last Post: March 17th, 2002, 09:38 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •