Exploit notes - Basic overflow but not exploitable
This is the first tutorial of exercises solutions of Ricardo narvaja spanish course (ignore Google dangerous message). Binary is named Vulnerable_No_vulnerable.exe in 21 lesson. When we run the binary it asks us to introduce an input we also view a string so we already have a starting point to see the references to that string in the .text section. We see the first comparison where it is checked..
Windows Exploiting
2019. 3. 12. 19:15
Notice
Recent Posts
Recent Comments
- Total
- Today
- Yesterday
Link
TAG
- GOT Dereferencing/Overwriting
- Call oriented programming
- write primitive
- open-redirect
- one gadget
- Windows
- leak libc
- Backdoors
- 32Bit
- shellcode
- pwnable.tw
- hijacking redirection flow
- return oriented programming
- canary
- pwnable.xyz
- stack pivot
- cracking
- use after free
- Pwnable.kr
- ASM
- fake stack frame
- html injection
- format string
- leak stack memory address
- buffer overflow
- XSS
- theFaunia course
- arithmetic overflow/underflow
- dnspy
- x64dbg
일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | |||||
3 | 4 | 5 | 6 | 7 | 8 | 9 |
10 | 11 | 12 | 13 | 14 | 15 | 16 |
17 | 18 | 19 | 20 | 21 | 22 | 23 |
24 | 25 | 26 | 27 | 28 | 29 | 30 |
31 |
Archives