Secret Keeper - Pragyan CTF 19
Write-up - Use After FreePKTeam 1. Register. We start registering a user AAAA. 0x555555554ac3 lea rax, [rbp-0x60] 0x555555554ac7 lea rsi, [rip+0x695] # 0x555555555163 0x555555554ace mov rdi, rax 0x555555554ad1 call 0x5555555548b0 We see a comparison of our input in RAX register. This register contains a memory address of the stack that contains the AAAA input. In RSI register we have the string ..
Pwning in Linux
2019. 3. 9. 07:13
Notice
Recent Posts
Recent Comments
- Total
- Today
- Yesterday
Link
TAG
- theFaunia course
- write primitive
- Pwnable.kr
- stack pivot
- hijacking redirection flow
- open-redirect
- leak stack memory address
- x64dbg
- return oriented programming
- cracking
- leak libc
- Windows
- arithmetic overflow/underflow
- one gadget
- pwnable.xyz
- Call oriented programming
- GOT Dereferencing/Overwriting
- html injection
- dnspy
- ASM
- pwnable.tw
- shellcode
- 32Bit
- Backdoors
- canary
- format string
- use after free
- XSS
- buffer overflow
- fake stack frame
일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | |||||
3 | 4 | 5 | 6 | 7 | 8 | 9 |
10 | 11 | 12 | 13 | 14 | 15 | 16 |
17 | 18 | 19 | 20 | 21 | 22 | 23 |
24 | 25 | 26 | 27 | 28 | 29 | 30 |
31 |
Archives