Comprehensive Analysis of String Handling Functions in C Language

Comprehensive Analysis of String Handling Functions in C Language

Comprehensive Analysis of String Handling Functions in C Language In C language, strings are stored as arrays of characters and are terminated with a null character <span>'\0'</span>. The C standard library provides a series of functions to handle strings, which are defined in the header file <span><string.h></span>. This article will detail commonly used string handling … Read more

Latest Discovery: Vulnerabilities in NFC Readers Challenge Embedded System Security!

Latest Discovery: Vulnerabilities in NFC Readers Challenge Embedded System Security!

According to a report by Wired magazine, IOActive security researcher Josep Rodriquez warns that: many NFC readers used in modern ATMs and POS systems have vulnerabilities that make the machines susceptible to attacks. A video shared by Wired shows that Rodriquez was able to make an ATM in Madrid display error messages simply by waving … Read more

MIPS Stack Overflow: ROP Construction and Shellcode Injection

MIPS Stack Overflow: ROP Construction and Shellcode Injection

0. Introduction Recently, I wrote about the DVRF series topics, and I still feel a bit overwhelmed by the construction of ROP, so I decided to delve deeper into how to construct ROP chains during the May Day holiday. Note: The entire process should be replicated using Ubuntu 16.04. Do not use 18.04 or 20.04, … Read more

C Language Algorithm – Integer Reversal Problem

C Language Algorithm - Integer Reversal Problem

Today’s algorithm problem is to solve the "Integer Reversal" algorithm using C language. Below are my algorithm ideas and implementation. Let’s take a look. Algorithm Problem Given a 32-bit signed integer, reverse it. Algorithm Idea We will use a clever method to solve the integer reversal problem. The idea of the algorithm is to reverse … Read more

Discussion: Pitfalls of C Language memcpy and memmove

Discussion: Pitfalls of C Language memcpy and memmove

Company coding standards prohibit the use of unsafe functions and require the use of custom safe functions developed internally. In C language, some functions are not absolutely safe, such as memcpy which may have overlapping memory regions; strcpy, gets, and sprintf do not check the size of the target buffer; and scanf series (which do … Read more

Exploiting Router Vulnerabilities: A Case Study on TP-LINK

Exploiting Router Vulnerabilities: A Case Study on TP-LINK

Introduction: With the gradual development of the Internet of Things (IoT) era, the connections between devices have become closer, and each node cannot exist independently. Devices that are closely related to our daily lives, such as routers, cameras, and printers, increasingly impact various aspects of our lives, from personal privacy to intelligence gathering between hostile … Read more

Getting Started with Linux: Your First Progress Bar Program Made Easy!

Linux | Red Hat Certified | IT Technology | Operations Engineer 👇 Join our technical exchange QQ group with 1000 members, note 【public account】 for faster approval 1. Carriage Return and Line Feed In Windows, we consider carriage return and line feed as one concept; however, in reality, line feed moves to the current position … Read more

Linux x86 Buffer Overflow Level 3: Simple Buffer Overflow, Bypassing DEP and ASLR Protection via ROP

Linux x86 Buffer Overflow Level 3: Simple Buffer Overflow, Bypassing DEP and ASLR Protection via ROP

Preparation Work Enable ASLR and DEP protection. sudo -s echo 2 > /proc/sys/kernel/randomize_va_space To enable DEP protection, simply remove the<span>-z execstack</span> option when compiling with gcc. <span>gcc -m32 -fno-stack-protector -o level3 level3.c</span> Randomized Base Address The following shows the maps situation when running level3 multiple times. First Run $ cat /proc/22020/maps 56652000-56653000 r–p 00000000 08:03 … Read more

Avoiding Overflow Errors in Keil C51 Large Integer Constants

Avoiding Overflow Errors in Keil C51 Large Integer Constants

The default integer constant operations in the C51 compiler may lead to overflow errors. To avoid potential calculation errors, the data type of large integers should be specified. Keil C51 is a compiler compatible with ANSI C. The ANSI C standard specifies that the default data types for decimal integer constants are one of int, … Read more

Router Vulnerability EXP Development Practice

Router Vulnerability EXP Development Practice

Author: Member of Hongri Security lifeand Blog Address: http://sec-redclub.com/team/ Book Giveaway: “Unveiling Home Router 0day Vulnerability Exploitation Techniques” Event Address: Free book giveaway in March Testing Environment Debian 9 Qemu This article mainly discusses the development of an exploit for the buffer overflow vulnerability in routers, using CVE-2013-0230 as an example. 0x01 Environment Setup Using … Read more