This is the first tutorial of exercises solutions of Ricardo narvaja spanish course (ignore Google dangerous message). Binary is named Vulnerable_No_vulnerable.exe in 21 lesson. When we run the binary it asks us to introduce an input we also view a string so we already have a starting point to see the references to that string in the .text section. We see the first comparison where it is checked..
Writeup - From Format String to Buffer OverflowPKTeam Recon First of all we see the protections of the binary. We have several problems. We can not execute code in the stack such as a shellcode due to NX, we can not overflow without having a canary leak and if we want to attach with gdb we have to bypass PIE as if we want to do ROP (Return-Oriented Programming). We also need leak of a function t..
- Total
- Today
- Yesterday
- canary
- Call oriented programming
- 32Bit
- x64dbg
- arithmetic overflow/underflow
- Pwnable.kr
- hijacking redirection flow
- cracking
- ASM
- return oriented programming
- theFaunia course
- one gadget
- XSS
- shellcode
- Windows
- buffer overflow
- GOT Dereferencing/Overwriting
- format string
- html injection
- use after free
- pwnable.tw
- Backdoors
- stack pivot
- pwnable.xyz
- dnspy
- leak libc
- leak stack memory address
- write primitive
- fake stack frame
- open-redirect
일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | ||
6 | 7 | 8 | 9 | 10 | 11 | 12 |
13 | 14 | 15 | 16 | 17 | 18 | 19 |
20 | 21 | 22 | 23 | 24 | 25 | 26 |
27 | 28 | 29 | 30 |