Update: I have fixed the argv array pointers not being valid causing the continuous loop and have updated the assembly code. Now the only issue is the disappearing space char on compilation. I’ve been experimenting with executing shellcode after exploiting a buffer overflow on a 32-bit Linux VM. My assembly program simply uses execve to start a shell via python
Tag: shellcode
Why does my shellcode segfault when executed from C, but not as a stand-alone executable?
I’m trying to execute a shell with shellcode. I’ve made this code in a 64-bits machine: After using nasm and linking with ld if i execute the file this works fine. The problem is if i get the shellcode from this and tried to execute it with this program: It gives me a segmentation fault error. I can’t see what’s
GDB – Assembly program returns /bin/sh: 0: Can’t open �
I am presently learning 64-bit assembly language from the related Pentester Academy course. The code I’m working on creates the following error when ran in GDB: /bin/sh: 0: Can’t open � [Inferior 1 (process 4049) exited with code 0177] I have googled the error and exit code and haven’t found anything helpful. I tried analyzing the code in GDB over