From 4863f37c430d8d86310490869bc97fcdfd65d8fc Mon Sep 17 00:00:00 2001 From: Mari Wahl Date: Thu, 12 Feb 2015 18:42:26 -0800 Subject: [PATCH] disclaimer --- Memory_Exploits/README.md | 13 +++++++++---- 1 file changed, 9 insertions(+), 4 deletions(-) diff --git a/Memory_Exploits/README.md b/Memory_Exploits/README.md index 8df28ab..5cf8209 100644 --- a/Memory_Exploits/README.md +++ b/Memory_Exploits/README.md @@ -5,7 +5,7 @@ * Unbounded data copying is bad. -* Lots of APIs: +* Lots of APIs: - strcpy() - strcat() - sprintf() @@ -151,10 +151,10 @@ return 1; } ``` -### Integer Overflow Exploitation +### Integer Overflow Exploitation -* In the code below, buf is intend to have enough space +1 to store a NULL byte for a string. -* If the network data supplied is 0xFFFFFFF (max 32 bit value), when 1 is added, it will wrap to 0. This means that the length passed to malloc is zero bytes. +* In the code below, buf is intend to have enough space +1 to store a NULL byte for a string. +* If the network data supplied is 0xFFFFFFF (max 32 bit value), when 1 is added, it will wrap to 0. This means that the length passed to malloc is zero bytes. * malloc() will return an under-sized buffer that allows memory corruption in read(). ``` @@ -227,3 +227,8 @@ void extractUserZip(char *userFile) ### C-codes - Get env variable + +---- + +## Disclaimer +Some of these scripts are older and some of them are not mine. If you see code you recognize here please let me know in a Issue so I can assign proper credit.