Writeup: tlsv00
We begin by looking at the protections of the binary. We have several problems and we can not execute code in the stack due to NX protection and we do not see the possibility of an overflow due to canary. We also have PIE activated and full relro so GOT dereferencing/overwriting will not be possible. We start with option 3 that will call the print_flag function. If we see inside the function we ..
Pwning in Linux
2019. 3. 30. 23:49
Notice
Recent Posts
Recent Comments
- Total
- Today
- Yesterday
Link
TAG
- leak stack memory address
- Windows
- return oriented programming
- hijacking redirection flow
- fake stack frame
- canary
- Backdoors
- shellcode
- write primitive
- 32Bit
- leak libc
- XSS
- use after free
- format string
- theFaunia course
- pwnable.tw
- Call oriented programming
- x64dbg
- stack pivot
- cracking
- open-redirect
- ASM
- one gadget
- html injection
- pwnable.xyz
- buffer overflow
- dnspy
- GOT Dereferencing/Overwriting
- arithmetic overflow/underflow
- Pwnable.kr
일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | |||||
3 | 4 | 5 | 6 | 7 | 8 | 9 |
10 | 11 | 12 | 13 | 14 | 15 | 16 |
17 | 18 | 19 | 20 | 21 | 22 | 23 |
24 | 25 | 26 | 27 | 28 | 29 | 30 |
31 |
Archives