Go to index Menu

Pwning stuffs

프로필사진
  • New Post
  • Management
  • Tags
  • Guestbook
  • RSS

Pwning stuffs

Search form
  • 분류 전체보기 (25)
    • Pwning in Linux (15)
    • Windows Exploiting (4)
    • Cracking (4)
    • ARM Exploiting (0)
    • Web Hacking (1)
    • Reversing (0)
    • Crypto (0)
    • Cloud (0)
  • guestbook

Call oriented programming (1)
Writeup: 3x17

We will start by looking at the protections of the binary and we realize that NX is enabled so it will not let us execute code in memory. First we see that our attack vector are two inputs but we do not know the iteration that the program returns to us. So we will have to open gdb and analyze the code in search of how to exploit it and perform the important task of reverse engineering. After see..

Pwning in Linux 2019. 3. 27. 05:02
Prev 1 Next
Prev Next
Notice
Recent Posts
Recent Comments
Total
Today
Yesterday
Link
TAG
  • open-redirect
  • x64dbg
  • shellcode
  • leak stack memory address
  • dnspy
  • fake stack frame
  • GOT Dereferencing/Overwriting
  • hijacking redirection flow
  • canary
  • Pwnable.kr
  • format string
  • 32Bit
  • pwnable.xyz
  • write primitive
  • leak libc
  • buffer overflow
  • ASM
  • Backdoors
  • Call oriented programming
  • html injection
  • XSS
  • theFaunia course
  • return oriented programming
  • one gadget
  • stack pivot
  • Windows
  • pwnable.tw
  • cracking
  • arithmetic overflow/underflow
  • use after free
more
«   2025/09   »
일 월 화 수 목 금 토
1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30
Archives

Blog is powered by Tistory / Designed by Tistory

티스토리툴바