Hello)
Maybe some people know such, for example compileonline.com
In general, one question remains, the security of these services.
However, everything in the district and around.
There is this exploit:
#include <stdio.h> extern "C" asm( ".global _data\n" ".data\n" "_data:\n" ".incbin \"/etc/passwd\"\n" ".byte 0" ); extern const char _data; const char* data = &_data; int main() { printf("%s", data); }
Here, during the compilation, the incbin assembler function is called, which in turn, at the time of compilation, starts or reads a third-party file, in this exploit, the etc / passwd file is read.
In order to exploit the vulnerability, it is necessary in any online compiler to compile the above code shown under the C ++ language
And now the question is: I would like to know if there is an equivalent of this assembly function, just not reading, but creating certain files?
root'
, while not reading/etc/passwd,
but/etc/shadow.
It is clear that in normal systems compilation and launch of binaries will be carried out in a specialsandbox'е
or at least underdedicated restricted
user. - Costantino Rupert:)
- Costantino Rupert