Exploit notes - Basic overflow but not exploitable
This is the first tutorial of exercises solutions of Ricardo narvaja spanish course (ignore Google dangerous message). Binary is named Vulnerable_No_vulnerable.exe in 21 lesson. When we run the binary it asks us to introduce an input we also view a string so we already have a starting point to see the references to that string in the .text section. We see the first comparison where it is checked..
Windows Exploiting
2019. 3. 12. 19:15
Notice
Recent Posts
Recent Comments
- Total
- Today
- Yesterday
Link
TAG
- XSS
- theFaunia course
- Windows
- write primitive
- shellcode
- fake stack frame
- GOT Dereferencing/Overwriting
- hijacking redirection flow
- open-redirect
- stack pivot
- arithmetic overflow/underflow
- Backdoors
- ASM
- pwnable.tw
- canary
- format string
- x64dbg
- buffer overflow
- return oriented programming
- html injection
- pwnable.xyz
- dnspy
- Pwnable.kr
- Call oriented programming
- one gadget
- leak stack memory address
- 32Bit
- use after free
- leak libc
- cracking
일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | |||||
3 | 4 | 5 | 6 | 7 | 8 | 9 |
10 | 11 | 12 | 13 | 14 | 15 | 16 |
17 | 18 | 19 | 20 | 21 | 22 | 23 |
24 | 25 | 26 | 27 | 28 | 29 | 30 |
31 |
Archives