{"id":1398,"date":"2017-05-18T08:58:27","date_gmt":"2017-05-18T08:58:27","guid":{"rendered":"https:\/\/www.varutra.com\/blog\/?p=1398"},"modified":"2022-12-02T16:20:29","modified_gmt":"2022-12-02T10:50:29","slug":"buffer-overflow-attacks","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/buffer-overflow-attacks\/","title":{"rendered":"Buffer Overflow Attacks"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2017\/05\/Buffer-overflow-Copy-1024x573.png\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"Buffer overflow Copy - Varutra Consulting\"><\/p>\n<h3><strong><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/BO.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-1418\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/BO.jpg\" alt=\"Buffer Overflow Attacks\" width=\"401\" height=\"188\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/BO.jpg 1000w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/BO-300x140.jpg 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/BO-768x359.jpg 768w\" sizes=\"(max-width: 401px) 100vw, 401px\" \/><\/a>Introduction to Buffer Overflow<\/strong><\/h3>\n<p>Buffer is a storage place in memory where data can be stored. It\u2019s mostly bound in a conditional statements to check the value given by the user and enter it in to the buffer and if the value entered by user is more than the actual size of the buffer then it should not accept it and should throw an error. But what most of the times happens is buffer fail to recognise its actual size and continue to accept the input from user beyond its limit and that result in overflow which causes application to behave improperly and this would lead to overflow attacks.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>In this article we will demonstrate buffer overflow attack on the Minishare 1.4.1 application which is vulnerable to buffer overflow attack.<\/strong><\/h3>\n<p>Download link: <a href=\"https:\/\/sourceforge.net\/projects\/minishare\/files\/OldFiles\/minishare-1.4.1-fin.exe\/download?use_mirror=master&amp;download=&amp;failedmirror=kent.dl.sourceforge.net\">https:\/\/sourceforge.net\/projects\/minishare\/files\/OldFiles\/minishare-1.4.1-fin.exe\/download?use_mirror=master&amp;download=&amp;failedmirror=kent.dl.sourceforge.net<\/a><\/p>\n<p>And install it in windows XP (VM) to have better results.<\/p>\n<p>I am using Kali Linux as an attacker machine and also install Immunity Debugger on your windows XP machine to debug the application that we are going to exploit.<\/p>\n<p><strong>Step 1<\/strong>: Install Minishare 1.4.1 on Windows XP machine and check the port on which it is running. In my case its running on port 80.<\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1399 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/1.png\" alt=\"Install Minishare 1.4.1\" width=\"574\" height=\"174\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/1.png 574w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/1-300x91.png 300w\" sizes=\"(max-width: 574px) 100vw, 574px\" \/><\/a><\/p>\n<p><strong>Step<\/strong> <strong>2<\/strong>: Now we will create one python script. We are sending 2000 A\u2019s to the target to see whether it\u2019s getting crashed or not.<\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1400 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/2.png\" alt=\"create one python script\" width=\"379\" height=\"139\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/2.png 379w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/2-300x110.png 300w\" sizes=\"(max-width: 379px) 100vw, 379px\" \/><\/a><\/p>\n<p><strong>Step 3<\/strong>: But before that we need to give permission to our file so in my case its 1.py and IP 192.168.230.131 is of my Windows XP machine.<\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1401 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/3.png\" alt=\"Windows XP\" width=\"382\" height=\"59\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/3.png 382w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/3-300x46.png 300w\" sizes=\"(max-width: 382px) 100vw, 382px\" \/><\/a><\/p>\n<p><strong>Step 4<\/strong>: Now the Minishare should be running on your Windows XP machine and after running above python script the application should get crashed and check the offset by clicking on to Click here and it should be hex value of A which 41.Now from this we can conclude that the application is not able to handle this much (2000 A\u2019s) and get crashed. In short EIP (Instruction Pointer) is overwritten with AAAA leading to crash<\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1402 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/4.png\" alt=\"EIP (Instruction Pointer)\" width=\"624\" height=\"336\" \/><\/a><\/p>\n<p><strong>Step 5<\/strong>: To check which offset value of buffer overwrites EIP we will use the ruby script which is readily available in our metasploit modules. As shown in below screen shot go to path in usr-&gt;share-&gt;metasploit-framework-&gt;tools-&gt;exploit.<\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1403 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/5.png\" alt=\"metasploit modules\" width=\"624\" height=\"293\" \/><\/a><\/p>\n<p><strong>Step 6<\/strong>: Copy the pattern generated into python script as below.<\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1404 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/6.png\" alt=\"python script\" width=\"624\" height=\"212\" \/><\/a><\/p>\n<p><strong>Step 7<\/strong>: Now open the Minishare in Immunity Debugger to check the value of EIP (Instruction Pointer) and ESP (Stack Pointer) register. You can see that the EIP is overwritten with \u201836684335\u2019 and ESP is overwritten with \u2018Ch7Ch\u2019.<\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/7.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1405 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/7.png\" alt=\"EIP (Instruction Pointer) and ESP (Stack Pointer)\" width=\"624\" height=\"241\" \/><\/a><\/p>\n<p><strong>Step 8<\/strong>: To check the offset between EIP and ESP we have tool in metasploit framework.Just go to path as shown below.<\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/8.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1415 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/8.png\" alt=\"offset between EIP and ESP\" width=\"624\" height=\"81\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/8.png 624w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/8-300x39.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/a><\/p>\n<p><strong>Step 9<\/strong>: We can conclude that EIP start from 1787 and contain four characters and ESP starts from 1791.<\/p>\n<p>Now we will over write 4 bytes after 1787 with character B, in order to check that our calculation of EIP is correct. In order to that the changes has been made in the script as below:<\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/9.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1407 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/9.png\" alt=\"ESP starts\" width=\"394\" height=\"231\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/9.png 394w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/9-300x176.png 300w\" sizes=\"(max-width: 394px) 100vw, 394px\" \/><\/a><\/p>\n<p><strong>Step 10<\/strong>: As seen below our calculation is correct as EIP is overwritten with 424242 i.e. BBB (hex) and ESP is overwritten with CCC.<\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/10.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1408 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/10.png\" alt=\"ESP is overwritten with CCC\" width=\"624\" height=\"214\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/10.png 624w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/10-300x103.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/a><\/p>\n<p><strong>Step 11<\/strong>: Now here comes the dreaded part of finding bad characters. Bad character are \\r\\n (\\x0a\\x0d in hex) which also called Carriage return (\\r) and Next Line (\\n).If the \\x0d and \\x0a are present anywhere in the buffer then it get terminated and rest of the remaining buffer will not be taken into consideration. Most of the time \\x00 is bad character.<\/p>\n<p>Now we will add the series of characters from \\x01 to \\xff into my buffer and check it in debugger to check for bad characters.<\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/11.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1409 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/11.png\" alt=\"check for bad characters\" width=\"522\" height=\"382\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/11.png 522w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/11-300x220.png 300w\" sizes=\"(max-width: 522px) 100vw, 522px\" \/><\/a><\/p>\n<p><strong>Step 12<\/strong>: From the below screenshot we can see that 4141 and then 01,02\u2026.0C then after that 0D is expected but the buffer breaks which means bad character is present. So remove the bad character which \\x0d and re run the code above and check whether the sequence gets completed or not.<\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/12.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1410 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/12.png\" alt=\"buffer breaks\" width=\"624\" height=\"286\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/12.png 624w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/12-300x138.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/a><\/p>\n<p><strong>Step 13<\/strong>: The series is now get completed.After that we will search for JMP instruction.<\/p>\n<p>So basically when the crash occurs we want the content of ESP to be executed by EIP.<\/p>\n<p>This means we have to make EIP jump to ESP. This can be achieved by executing JMP ESP instruction.<\/p>\n<p>We will open the server and look for the executable modules in Immunity Debugger that contains JMP ESP instruction and then we will overwrite memory address of that instruction on EIP.<\/p>\n<p>From below screenshot we can see that USER32 has JMP ESP Instruction<\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/13.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1411 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/13.png\" alt=\"JMP instruction\" width=\"624\" height=\"216\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/13.png 624w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/13-300x104.png 300w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/a><\/p>\n<p>Note the JMP ESP address 77D8AF0A and make it reverse \\x0a\\xaf\\x8a\\xd8\\x77.<\/p>\n<p><strong>Step 14<\/strong>: Now we need to create payload using msfvenom by entering below command to get the reverse shell.<\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/14.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1412 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/14.png\" alt=\"payload using msfvenom\" width=\"612\" height=\"179\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/14.png 612w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/14-300x88.png 300w\" sizes=\"(max-width: 612px) 100vw, 612px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Step 15<\/strong>: Now our final script will look like this which will also include code generated from msfvenom command.<\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/15.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1413 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/15.png\" alt=\"msfvenom command\" width=\"624\" height=\"688\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/15.png 624w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/15-272x300.png 272w\" sizes=\"(max-width: 624px) 100vw, 624px\" \/><\/a><\/p>\n<p><strong>Step 16<\/strong>: Run the exploit and on kali machine listen to incoming connection like below. We got reverse shell on our Windows XP machine.<\/p>\n<p><a href=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/16.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1414 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/16.png\" alt=\"exploit and on kali machine\" width=\"497\" height=\"335\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/16.png 497w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/16-300x202.png 300w\" sizes=\"(max-width: 497px) 100vw, 497px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Conclusion<\/strong>:<\/h3>\n<p>Minishare is vulnerable to buffer overflow attack and this vulnerable application is already installed on windows xp. Due to exploitation of Minishare application we got the reverse shell on the target system.Kindly do not install the applications which are already having such vulnerabilities which may cause a huge damage to your system.<\/p>\n<p>AUTHOR:<\/p>\n<p>Pranav J.<\/p>\n<p><em>Attack &amp; PenTest Team,<\/em><\/p>\n<p><em>Varutra Consulting<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Introduction to Buffer Overflow Buffer is a storage place in memory where data can be stored. It\u2019s mostly bound in a conditional statements to check&#8230;<\/p>\n","protected":false},"author":3,"featured_media":3226,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[140,276,278,274,57],"tags":[108,109,110,111,112],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"In this article we will demonstrate buffer overflow attack on the Minishare 1.4.1 application which is vulnerable to buffer overflow attack.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/buffer-overflow-attacks\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Buffer Overflow Attacks on the Minishare 1.4.1 application\" \/>\n\t\t<meta property=\"og:description\" content=\"In this article we will demonstrate buffer overflow attack on the Minishare 1.4.1 application which is vulnerable to buffer overflow attack.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/buffer-overflow-attacks\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/Buffer-overflow-Copy.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/Buffer-overflow-Copy.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"1250\" \/>\n\t\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t\t<meta property=\"article:section\" content=\"Case Study\" \/>\n\t\t<meta property=\"article:tag\" content=\"buffer overflow\" \/>\n\t\t<meta property=\"article:tag\" content=\"exploit\" \/>\n\t\t<meta property=\"article:tag\" content=\"india cert-in\" \/>\n\t\t<meta property=\"article:tag\" content=\"minishare\" \/>\n\t\t<meta property=\"article:tag\" content=\"windows xp vulnerability\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2017-05-18T08:58:27+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-12-02T10:50:29+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Buffer Overflow Attacks on the Minishare 1.4.1 application\" \/>\n\t\t<meta name=\"twitter:description\" content=\"In this article we will demonstrate buffer overflow attack on the Minishare 1.4.1 application which is vulnerable to buffer overflow attack.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/Buffer-overflow-Copy.png\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpadmin\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/buffer-overflow-attacks\\\/#article\",\"name\":\"Buffer Overflow Attacks on the Minishare 1.4.1 application\",\"headline\":\"Buffer Overflow Attacks\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/Buffer-overflow-Copy.png\",\"width\":1250,\"height\":700,\"caption\":\"Buffer overflow - Copy\"},\"datePublished\":\"2017-05-18T08:58:27+05:30\",\"dateModified\":\"2022-12-02T16:20:29+05:30\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/buffer-overflow-attacks\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/buffer-overflow-attacks\\\/#webpage\"},\"articleSection\":\"Case Study, Cyber Attack, Network Pentesting, Security Hardening, Vulnerability Disclosure, buffer overflow, exploit, India cert-in, minishare, windows xp vulnerability\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/buffer-overflow-attacks\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/buffer-overflow-attacks\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/buffer-overflow-attacks\\\/#listItem\",\"position\":2,\"name\":\"Buffer Overflow Attacks\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/buffer-overflow-attacks\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/buffer-overflow-attacks\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/\",\"name\":\"kalpadmin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/buffer-overflow-attacks\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpadmin\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/buffer-overflow-attacks\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/buffer-overflow-attacks\\\/\",\"name\":\"Buffer Overflow Attacks on the Minishare 1.4.1 application\",\"description\":\"In this article we will demonstrate buffer overflow attack on the Minishare 1.4.1 application which is vulnerable to buffer overflow attack.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/buffer-overflow-attacks\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2017\\\/05\\\/Buffer-overflow-Copy.png\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/buffer-overflow-attacks\\\/#mainImage\",\"width\":1250,\"height\":700,\"caption\":\"Buffer overflow - Copy\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/buffer-overflow-attacks\\\/#mainImage\"},\"datePublished\":\"2017-05-18T08:58:27+05:30\",\"dateModified\":\"2022-12-02T16:20:29+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Buffer Overflow Attacks on the Minishare 1.4.1 application<\/title>\n\n","aioseo_head_json":{"title":"Buffer Overflow Attacks on the Minishare 1.4.1 application","description":"In this article we will demonstrate buffer overflow attack on the Minishare 1.4.1 application which is vulnerable to buffer overflow attack.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/buffer-overflow-attacks\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"Buffer Overflow Attacks on the Minishare 1.4.1 application","og:description":"In this article we will demonstrate buffer overflow attack on the Minishare 1.4.1 application which is vulnerable to buffer overflow attack.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/buffer-overflow-attacks\/","og:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/Buffer-overflow-Copy.png","og:image:secure_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/Buffer-overflow-Copy.png","og:image:width":"1250","og:image:height":"700","article:section":"Case Study","article:tag":["buffer overflow","exploit","india cert-in","minishare","windows xp vulnerability"],"article:published_time":"2017-05-18T08:58:27+00:00","article:modified_time":"2022-12-02T10:50:29+00:00","twitter:card":"summary_large_image","twitter:title":"Buffer Overflow Attacks on the Minishare 1.4.1 application","twitter:description":"In this article we will demonstrate buffer overflow attack on the Minishare 1.4.1 application which is vulnerable to buffer overflow attack.","twitter:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/Buffer-overflow-Copy.png","twitter:label1":"Written by","twitter:data1":"kalpadmin","twitter:label2":"Est. reading time","twitter:data2":"5 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/buffer-overflow-attacks\/#article","name":"Buffer Overflow Attacks on the Minishare 1.4.1 application","headline":"Buffer Overflow Attacks","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/Buffer-overflow-Copy.png","width":1250,"height":700,"caption":"Buffer overflow - Copy"},"datePublished":"2017-05-18T08:58:27+05:30","dateModified":"2022-12-02T16:20:29+05:30","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/buffer-overflow-attacks\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/buffer-overflow-attacks\/#webpage"},"articleSection":"Case Study, Cyber Attack, Network Pentesting, Security Hardening, Vulnerability Disclosure, buffer overflow, exploit, India cert-in, minishare, windows xp vulnerability"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/buffer-overflow-attacks\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/buffer-overflow-attacks\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/buffer-overflow-attacks\/#listItem","position":2,"name":"Buffer Overflow Attacks","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/buffer-overflow-attacks\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/buffer-overflow-attacks\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/","name":"kalpadmin","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/buffer-overflow-attacks\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpadmin"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/buffer-overflow-attacks\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/buffer-overflow-attacks\/","name":"Buffer Overflow Attacks on the Minishare 1.4.1 application","description":"In this article we will demonstrate buffer overflow attack on the Minishare 1.4.1 application which is vulnerable to buffer overflow attack.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/buffer-overflow-attacks\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2017\/05\/Buffer-overflow-Copy.png","@id":"https:\/\/www.varutra.com\/varutravrt3\/buffer-overflow-attacks\/#mainImage","width":1250,"height":700,"caption":"Buffer overflow - Copy"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/buffer-overflow-attacks\/#mainImage"},"datePublished":"2017-05-18T08:58:27+05:30","dateModified":"2022-12-02T16:20:29+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"1398","title":"Buffer Overflow Attacks on the Minishare 1.4.1 application","description":"In this article we will demonstrate buffer overflow attack on the Minishare 1.4.1 application which is vulnerable to buffer overflow attack.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"Buffer Overflow\",\"score\":90,\"analysis\":{\"keyphraseInTitle\":{\"title\":\"Focus keyphrase in SEO title\",\"description\":\"Focus keyphrase found in SEO title.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"title\":\"Focus keyphrase in meta description\",\"description\":\"Focus keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Focus keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInURL\":{\"title\":\"Focus keyphrase in URL\",\"description\":\"Focus keyphrase used in the URL.\",\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"title\":\"Focus keyphrase in introduction\",\"description\":\"Your Focus keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInSubHeadings\":{\"title\":\"Focus keyphrase in Subheadings\",\"description\":\"Your H2 and H3 subheadings reflects the topic of your copy. Good job!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Focus keyphrase in image alt attributes\",\"description\":\"Focus keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},\"additional\":[{\"keyphrase\":\"Buffer Overflow Attacks\",\"score\":67,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase not found in meta description.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":3},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},{\"keyphrase\":\"Buffer\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":1},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}}]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"featured","og_image_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2017\/05\/Buffer-overflow-Copy.png","og_image_width":"1250","og_image_height":"700","og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":"Case Study","og_article_tags":[],"twitter_use_og":true,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2021-10-27 15:17:57","updated":"2022-12-02 10:59:38"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/case-study\/\" title=\"Case Study\">Case Study<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tBuffer Overflow Attacks\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Case Study","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/case-study\/"},{"label":"Buffer Overflow Attacks","link":"https:\/\/www.varutra.com\/varutravrt3\/buffer-overflow-attacks\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/1398"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=1398"}],"version-history":[{"count":6,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/1398\/revisions"}],"predecessor-version":[{"id":20364,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/1398\/revisions\/20364"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/3226"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=1398"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=1398"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=1398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}