Skip to main content

Questions tagged [code-execution]

The process of executing code, either maliciously or not, on a system or device. The term is often used when talking about code injection vulnerabilities.

Filter by
Sorted by
Tagged with
3 votes
0 answers
151 views

On 2024-12-22 and 2024-12-23, Skype crashed 7 times with an access violation. This resulted in DMP files written to disk in a crash report folder. WinDbg's !analyze -v command outputs these top 5 ...
Thomas Weller's user avatar
13 votes
3 answers
5k views

I have a Rust-app executing Python-scripts using PyO3. The Python-scripts are uploaded by users, so I need to check for unsafe code before executing it. The scripts should only be able to do ...
O'Niel's user avatar
  • 3,540
1 vote
2 answers
707 views

I am trying to do a go program to execute a .exe file, but without be actually a .exe file. The idea is to read the executable from a .txt file and decode it (it is in base64). Once I have that code ...
P00's user avatar
  • 11
0 votes
2 answers
873 views

I currently got interested in binary exploitation (even though I do not know if today is still useful). I started studying shellcode and buffer overflow (stack-buffer overflow, specifically). I know ...
KmerPadreDiPdor's user avatar
0 votes
1 answer
219 views

I'm the attacker. What are all the options to run code at the Windows startup: If I have administrator rights? If I have normal user rights? Can someone put any program (or script) in this method or ...
psico_disk's user avatar
3 votes
2 answers
2k views

I used Didier Stevens's pdfid.py to check a pdf, and it found js and automatic actions associated with the pdf: How do I check if this is malicious code?
Randusr's user avatar
  • 43
1 vote
3 answers
3k views

I read a lot of reports where 'hackers' potentially exploited a 'Hidden HTTP Parameter'. There are also tons of tools which are developed for this exact purpose. Example : https://blog.yeswehack.com/...
Just.a.tech's user avatar
-1 votes
1 answer
133 views

I am searching for the best way to merge two parts of software together, so it would be as hard as possible to separate them again through reverse engineering. At the moment are both parts python, but ...
127 001's user avatar
  • 56
1 vote
2 answers
969 views

As a security measure, my Windows-based work computer has been configured to deny any application that hasn't been signed with a valid certificate; my system will run a signed executable from DropBox'...
Tenders McChiken's user avatar
1 vote
2 answers
3k views

I copy / pasted a data:image/png;Base64 image from a Google search into a Google Slide, before realizing it was a BASE64 image. Is there any possibility that this contains malicious code, or any way ...
Questionstoask's user avatar
3 votes
1 answer
457 views

I am doing a capture-the-flag exercise in a Windows scenario. It uses Windows 2016 server. I was able to find the password and I can access the files with a: net use z: \\computer\C$ password /user:...
psico_disk's user avatar
0 votes
1 answer
3k views

A web server running iis 10 ,PHP (windows) allows users to upload any type of pdf (the location and filename does not change on the server ). The files uploaded go though some file extension check ...
Nnnnn's user avatar
  • 1
0 votes
0 answers
161 views

Is it possible that clicking a link would hack a device? For example: injecting a malicious code into the device directly from the link's host website connecting to the device remotely in a way ...
Ramad530's user avatar
0 votes
0 answers
138 views

Would a file upload function be vulnerable to code execution where the uploaded file is always converted to a PNG file by the application? For example, if one uploads shell.php and this file is ...
synthesis's user avatar
  • 155
0 votes
1 answer
237 views

When hardening a system you want to remove any features that you do not need. I have been thinking about this concept from the perspective of interpreters like Python, NodeJS, PHP etc. and am ...
Blink's user avatar
  • 3
1 vote
2 answers
712 views

For context; I have a web application that allows users to upload a PDF file from which the web app extracts certain information by parsing it. The app then sends this information to another server ...
portabletable's user avatar
1 vote
0 answers
191 views

Go and Java have "compile time constants", and JavaScript will soon get a feature that allows "Distinguishing strings from a trusted developer from strings that may be attacker ...
Craig Francis's user avatar
1 vote
1 answer
198 views

A piece of malware detects signatures of the sandbox an AV solution tries to use to fingerprint malicious behavior and pretends to be innocent. Once in the real OS environment, it then downloads ...
john doe's user avatar
  • 775
3 votes
1 answer
1k views

I know it's possible to embed phar archives into jpeg images but is it also possible to do so with PNG images? I am testing a php application that securely checks if an image is a valid PNG image ...
t40_yx's user avatar
  • 45
1 vote
1 answer
158 views

For a toy CLI application I'm writing, I'd like to store a string with an user defined command that will be executed periodically (like shell -c <command_string>). I have seen other applications ...
roperzh's user avatar
  • 113
1 vote
1 answer
387 views

When I look up a site on wayback machine, I click through a couple of links on the site, and then instead of loading the page, it downloads a file called "default.exe". Since I was expecting ...
stevec's user avatar
  • 1,350
0 votes
1 answer
178 views

Discussion under this answer in Space Exploration SE links to items in NAIF; NASA Planetary Data System Navigation Node links for MacIntel_OSX_64bit I'm looking at these two. spy: https://naif.jpl....
user avatar
0 votes
2 answers
473 views

I have PDF, Word and MP4 files on my site and I want to protect them from illegal downloading even if my site hacked. I want to put executable code in the files, so if someone downloads and opens them,...
johny's user avatar
  • 9
0 votes
1 answer
700 views

Let's say the user has installed a python interpreter on their machine/browser, for example, using something like https://github.com/iodide-project/pyodide. I understand not allowing someone to enter ...
David542's user avatar
  • 111
1 vote
1 answer
208 views

So I recently downloaded Tor Browser on my Linux machine and what immediately caught my eye is the fact that after uncompressing the file (I think it was .tar.gz, but the question applies to every ...
Sir Muffington's user avatar
1 vote
0 answers
128 views

I work on a large e-commerce project, the app in question is written in Kotlin (legacy code in Java). Recently we got the following question from the web team which instantly triggered my alarm bells: ...
Droidman's user avatar
  • 111
0 votes
1 answer
1k views

Introduction – Context Everyone has seen so called "Injectors" or "Cracks" for certain programs & games at some point in their life. These applications inject their own code ...
stringExchange's user avatar
1 vote
1 answer
229 views

Numerous websites allow us to build and execute C code from web browsers (repl.it, onlinegdb.com, ideone.com...). For my own application (education purposes) I would like to do the same on my web ...
nowox's user avatar
  • 367
0 votes
1 answer
627 views

I have a server, which receives text mails from students and I plan to automatically collect their message bodys and parse them as markdown so that I can generate a nicely formatted output as pdf. Is ...
Jannek S.'s user avatar
  • 103
0 votes
2 answers
2k views

I uploaded a PHP web shell to a site, and to bypass the file upload restriction, I used a .php.jpg extension. When I open my shell with a web browser, it doesn't execute (confirmed with a packet ...
arsenic's user avatar
0 votes
1 answer
153 views

I (will) have a binary executable file. It's only permission is user-execute. It cannot be read by user, group, or world. The owner of the file is the Apache user. I don't want the apache user to be ...
Reed's user avatar
  • 105
1 vote
0 answers
340 views

I have been learning and implementing Process Hollowing attacks, and even after I got the thing work, I have some questions. Why aren't we building the IAT when we load our injected PE? All we do is ...
Eran Nahshon's user avatar
2 votes
0 answers
189 views

Kernels like linux-libre (standard in Debian and other free Linux distributions) ship no binary firmware packages by default. From my limited understanding of their functionality, a binary firmware ...
Prototype700's user avatar
3 votes
1 answer
4k views

I was reviewing code of an application that uses the following piece of Java code and wanted to know if the the use of exec() was susceptible to command injection. public class FindFileInDir { ...
JohnnyHunter's user avatar
1 vote
4 answers
244 views

I'm a newbie to software security. I'm designing a network and I was wondering is it possible to detect if a program upgrade being downloaded on the network is malicious just by analyzing the ...
user1690356's user avatar
2 votes
1 answer
3k views

My question Meaning of persistent full-chain -- ? What is the difference between OS-level CE and Kernel level CE? How do OS-level CE and Kernel level CE differentiate in impacting a system? Rarity and ...
pov's user avatar
  • 23
3 votes
1 answer
4k views

I have created an exe with a payload which gives me a meterpreter session. But I need to embed this exe into a pdf. Upon opening the pdf the exe ideally should get executed. Is there any way to do ...
Solo Trench's user avatar
1 vote
1 answer
234 views

I've been researching and testing different approaches when it comes to securing code secrets, and am unsure what the best options are, and if they even have any relevance once a host gets compromised....
R. StackUser's user avatar
2 votes
3 answers
2k views

Referenced in the recent VLC vulnerability and other places, apparently buffer overreads can cause arbitrary code execution. How does it do that? Suppose in the following toy example void badcpy(...
user212957's user avatar
1 vote
1 answer
2k views

I need to review a large number of .exe game files. I recently had an incident where I got infected by an .exe that passed all my 'checks': virus scan, Virustotal, reviews, community feedback, ...
kite's user avatar
  • 121
0 votes
0 answers
978 views

Some context I'm currently building an application which lets user's set up dynamic, queries they can execute later. A great addition to this seems like a regex module, in which users can filter ...
Paradoxis's user avatar
  • 862
0 votes
0 answers
200 views

I'm participating in one bugbounty program. This site runs on php (Apache) and uses amfphp library. Here are the things I found I can make this library do for me: Include (include_once call) any file ...
Alex Velickiy's user avatar
0 votes
2 answers
693 views

I created a parameter passing through system() i.e. cmd. Now I run Empire tool with http listener and launch powershell launcher. Got the huge bunch of base64 encode string. Now I pass this string to ...
Utkarsh Agrawal's user avatar
0 votes
1 answer
254 views

I found multiple PHP code execution attempts on my web server, which is running on asp. What happens when one attempts to execute php code on an asp web server? Will this create an impact on the ...
Mrj's user avatar
  • 1
9 votes
1 answer
2k views

During source code examination for a client, I found this code. It gets unsanitized parameter from GET, sanitizes it and does shell_exec() $arg = $_GET['arg']; // sanitization, I suppose... if(...
John Doe's user avatar
1 vote
0 answers
150 views

Why is it that server admins do not code sign the contents of their webservers (all php, css, js, etc.) and have Apache / NGINX / whatever server software refuse to execute or serve any code / ...
niemiro's user avatar
  • 162
0 votes
2 answers
653 views

For example, it is possible that someone could spread malware with insecure wifi access point, but I don't realize how sending a bunch of network packets can result into a compromised computer if the ...
M. Kalter's user avatar
4 votes
1 answer
226 views

Some services such as Github allows the execution of user supplied code using docker containers via Github Actions. Another example of a service provider that executes user provided code are ...
F21's user avatar
  • 511
2 votes
1 answer
195 views

After wondering about this and trying to better understanding, I tried the folowing code: is_string(3 and sleep(30)); Why PHP will execute code inside a parameter function (sleep in is_string) ? ...
Raphaël D's user avatar
0 votes
1 answer
398 views

I have a WordPress site running on version 4.9.8. In the recent security audit done by the organization following issues were reported. 1) Wordpress: CVE-2017-1000600: Input Validation vulnerability ...
Mukesh's user avatar
  • 293