This is the first tutorial of exercises solutions of Ricardo narvaja spanish course (ignore Google dangerous message). Binary is named Vulnerable_No_vulnerable.exe in 21 lesson. When we run the binary it asks us to introduce an input we also view a string so we already have a starting point to see the references to that string in the .text section. We see the first comparison where it is checked..
Writeup - From Format String to Buffer OverflowPKTeam Recon First of all we see the protections of the binary. We have several problems. We can not execute code in the stack such as a shellcode due to NX, we can not overflow without having a canary leak and if we want to attach with gdb we have to bypass PIE as if we want to do ROP (Return-Oriented Programming). We also need leak of a function t..
- Total
- Today
- Yesterday
- canary
- one gadget
- format string
- leak libc
- XSS
- ASM
- pwnable.xyz
- x64dbg
- shellcode
- Call oriented programming
- GOT Dereferencing/Overwriting
- buffer overflow
- Pwnable.kr
- dnspy
- use after free
- theFaunia course
- return oriented programming
- stack pivot
- open-redirect
- write primitive
- Backdoors
- cracking
- arithmetic overflow/underflow
- pwnable.tw
- html injection
- hijacking redirection flow
- leak stack memory address
- 32Bit
- fake stack frame
- Windows
| 일 | 월 | 화 | 수 | 목 | 금 | 토 |
|---|---|---|---|---|---|---|
| 1 | 2 | |||||
| 3 | 4 | 5 | 6 | 7 | 8 | 9 |
| 10 | 11 | 12 | 13 | 14 | 15 | 16 |
| 17 | 18 | 19 | 20 | 21 | 22 | 23 |
| 24 | 25 | 26 | 27 | 28 | 29 | 30 |
| 31 |