User Controls

Hello

  1. #41
    Føx Yung Blood
    Originally posted by ⠀⠀⠀⠀⠀⠀ Heap overflows allow you to run any kind of code on the target system, which can also be targeted to any piece of hardware on the system..

    https://en.wikipedia.org/wiki/Heap_overflow

    I know wtf heap overflow is. So explain how are you going to overwrite the BIOS using heap overflow, what software vulnerability allows access to change the BIOS and how do you escalate privileges to do so. And you didn’t answer the other questions about which GPU architectures were vulnerable to this and if this was a well known exploit what was it called and when was it active because I’ve never heard of it. Not in the way you’re describing
  2. #42
    ner vegas African Astronaut
    Originally posted by ⠀⠀⠀⠀⠀⠀ Heap overflows allow you to run any kind of code on the target system, which can also be targeted to any piece of hardware on the system..

    https://en.wikipedia.org/wiki/Heap_overflow

    lol

    explain the process of a heap overflow in your own words
    The following users say it would be alright if the author of this post didn't die in a fire!
  3. #43
    ner vegas African Astronaut
    and the GPU hack was intentionally messing up a firmware update so it corrupted the module that governed heat control IIRC

    shut down the fans and disable the standard emergency shutdown that usually happens when it hits 90
  4. #44
    Prometheus Houston
    ffs another one
  5. #45
    Originally posted by ner vegas lol

    explain the process of a heap overflow in your own words

    A heap overflow, heap overrun, or heap smashing is a type of buffer overflow that occurs in the heap data area. Heap overflows are exploitable in a different manner to that of stack-based overflows. Memory on the heap is dynamically allocated at runtime and typically contains program data. Exploitation is performed by corrupting this data in specific ways to cause the application to overwrite internal structures such as linked list pointers. The canonical heap overflow technique overwrites dynamic memory allocation linkage (such as malloc metadata) and uses the resulting pointer exchange to overwrite a program function pointer.
  6. #46
    ner vegas African Astronaut
    > in your own words
    The following users say it would be alright if the author of this post didn't die in a fire!
  7. #47
    Originally posted by ner vegas > in your own words



    Originally posted by vindicktive vinny more like hip overflow after getting done by a bunch of well endowed negroes
  8. #48
    Originally posted by ner vegas > in your own words

    A HEAP overflow, heap overrun, or heap smashing is a type of buffer overflow that occurs in the heap data area.

    The abbreviation for this vulnerability is typically “HEAP-Based buffer overflow”. The full title could be “HEAP Memory-Based Buffer Overflow Vulnerability”.

    A HEAP-Based buffer overflow vulnerability occurs when a program writes more data to a heap-allocated memory buffer than the buffer is designed to hold. This can cause the buffer to overflow, potentially overwriting adjacent memory and corrupting data. In some cases, this can also lead to remote code execution, allowing an attacker to execute arbitrary code on the affected system. The vulnerability occurs when the program does not adequately validate the size of user-supplied data before copying it into a heap-allocated buffer, allowing the attacker to write more data than the buffer is designed to hold.
  9. #49
    ner vegas African Astronaut
    thanks chat-pdd
  10. #50
    Originally posted by ner vegas thanks chat-pdd

    You don't get to tell me how I talk, bub.
  11. #51
    ner vegas African Astronaut
    Originally posted by ⠀⠀⠀⠀⠀⠀ You don't get to tell me how I talk, bub.

    0/10 scares
  12. #52
    Kingoffrogs Appendage of Stan
    Originally posted by ⠀⠀⠀⠀⠀⠀ You don't get to tell me how I talk, bub.

    BUB

    BUCKO

    LISTEN HERE, PAL

    HOLD YER HORSES

    NOW HOLD ON JUST A MINUTE PARDNER
    The following users say it would be alright if the author of this post didn't die in a fire!
  13. #53
    Originally posted by Kingoffrogs BUB

    BUCKO

    LISTEN HERE, PAL

    HOLD YER HORSES

    NOW HOLD ON JUST A MINUTE PARDNER

    It's ME BUCKO, but okay.
  14. #54
    infinityshock Black Hole
    Yippee kiyay, banditio...
  15. #55
    BeeReBuddy motherfucker [pimp your due marabout]
    lots of buzz words here
  16. #56
    Føx Yung Blood
    Originally posted by Currently Unknown I FOUND A PICTURE OF ME EATING MY GIRLFRIENDS ASS BUT I DON'T KNOW HOW TO POST IT SINCE I'M NEW TO THIS AND I SNORT DRIED PAINT CHIPS FOR FUN. Help me post the picture and you shall be rewarded sweetly. Do you accept this quest?

    Post the fuckin nudes asshole

    Originally posted by Føx God, another one?

    Go to this url:

    https://imgbb.com/

    Upload image. Pick from your camera roll or files. Don’t auto delete. In the drop down menu click BBCode Full Linked. Click copy.

    Come back here paste in reply box click submit
  17. #57
    maddie Tuskegee Airman
    Originally posted by ⠀⠀⠀⠀⠀⠀ Heap overflows allow you to run any kind of code on the target system, which can also be targeted to any piece of hardware on the system..

    https://en.wikipedia.org/wiki/Heap_overflow

    I can teach you if you want.

    By what I have been reading, you have a semi-understanding of heap overflows as a concept but you are still lacking the details on how they work.
  18. #58
    WellHung Black Hole (banned)
    TALKING TO YOURSELF IN HERE, SCRON? AT-A-GIRL.
  19. #59
    Originally posted by maddie I can teach you if you want.

    By what I have been reading, you have a semi-understanding of heap overflows as a concept but you are still lacking the details on how they work.

    I can figure anything out in minutes. I don't even need to be up to date on the latest details. Any situation I come to, I have it figured out almost immediately. I know for a fact I can use a heap overflow to run shellcode on any system. Might take me a day or two to test things out by trial and error, but you can rest assured I will accomplish my intentions. As I proved time and time again on Totse and Zoklet, nothing is beyond my reach.
  20. #60
    maddie Tuskegee Airman
    Originally posted by ⠀⠀⠀⠀⠀⠀ I can figure anything out in minutes. I don't even need to be up to date on the latest details. Any situation I come to, I have it figured out almost immediately. I know for a fact I can use a heap overflow to run shellcode on any system. Might take me a day or two to test things out by trial and error, but you can rest assured I will accomplish my intentions. As I proved time and time again on Totse and Zoklet, nothing is beyond my reach.

    You can even run shellcode on NX?
Jump to Top