This is the first tutorial of exercises solutions of Ricardo narvaja spanish course (ignore Google dangerous message). Binary is named Vulnerable_No_vulnerable.exe in 21 lesson. When we run the binary it asks us to introduce an input we also view a string so we already have a starting point to see the references to that string in the .text section. We see the first comparison where it is checked..
Writeup - From Format String to Buffer OverflowPKTeam Recon First of all we see the protections of the binary. We have several problems. We can not execute code in the stack such as a shellcode due to NX, we can not overflow without having a canary leak and if we want to attach with gdb we have to bypass PIE as if we want to do ROP (Return-Oriented Programming). We also need leak of a function t..
- Total
- Today
- Yesterday
- write primitive
- canary
- html injection
- x64dbg
- Call oriented programming
- 32Bit
- format string
- ASM
- stack pivot
- dnspy
- XSS
- Backdoors
- cracking
- pwnable.tw
- GOT Dereferencing/Overwriting
- open-redirect
- theFaunia course
- one gadget
- hijacking redirection flow
- shellcode
- pwnable.xyz
- return oriented programming
- arithmetic overflow/underflow
- Pwnable.kr
- leak libc
- fake stack frame
- use after free
- leak stack memory address
- Windows
- buffer overflow
일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | ||
6 | 7 | 8 | 9 | 10 | 11 | 12 |
13 | 14 | 15 | 16 | 17 | 18 | 19 |
20 | 21 | 22 | 23 | 24 | 25 | 26 |
27 | 28 | 29 | 30 | 31 |