Go to index Menu

Pwning stuffs

프로필사진
  • New Post
  • Management
  • Tags
  • Guestbook
  • RSS

Pwning stuffs

Search form
  • 분류 전체보기 (25)
    • Pwning in Linux (15)
    • Windows Exploiting (4)
    • Cracking (4)
    • ARM Exploiting (0)
    • Web Hacking (1)
    • Reversing (0)
    • Crypto (0)
    • Cloud (0)
  • guestbook

format string (3)
Writeup: echo2

At first we realize that there is a format string vulnerability by which we can leak the memory addresses of the stack and thus bypassing ASLR. After a few attempts we see that in position %10$p we leak memory address of the stack and at minus 0x20 it would be the pointer of name whose test content we entered was "AAAA". The next step is to create our exploit that makes the leak using pwntools l..

Pwning in Linux 2019. 3. 26. 04:39
Armoury - Pragyan CTF 19

Writeup - From Format String to Buffer OverflowPKTeam Recon First of all we see the protections of the binary. We have several problems. We can not execute code in the stack such as a shellcode due to NX, we can not overflow without having a canary leak and if we want to attach with gdb we have to bypass PIE as if we want to do ROP (Return-Oriented Programming). We also need leak of a function t..

Pwning in Linux 2019. 3. 10. 21:40
Exploit - GrownUp pwnable.xyz

Challenge GrownUp from pwnable.xyz nc svc.pwnable.xyz 30004 Exploit from pwn import * context.log_level = 'debug' p = remote("svc.pwnable.xyz",30004) #p = process('./GrownUpRedist') #gdb.attach(p,''' #break *0x0000000000400914 #continue #''') p.recvuntil("Are you 18 years or older? [y/N]: ") payload = "\x79"+"aaaBCCC"+"\x80\x10\x60" p.sendline(payload) p.recvuntil("Name: ") #payload = "AAAABBBBA..

Pwning in Linux 2019. 3. 1. 01:05
Prev 1 Next
Prev Next
Notice
Recent Posts
Recent Comments
Total
Today
Yesterday
Link
TAG
  • shellcode
  • pwnable.xyz
  • open-redirect
  • write primitive
  • stack pivot
  • Call oriented programming
  • fake stack frame
  • Pwnable.kr
  • XSS
  • dnspy
  • cracking
  • arithmetic overflow/underflow
  • GOT Dereferencing/Overwriting
  • ASM
  • format string
  • Windows
  • one gadget
  • canary
  • leak libc
  • return oriented programming
  • x64dbg
  • Backdoors
  • leak stack memory address
  • 32Bit
  • buffer overflow
  • hijacking redirection flow
  • pwnable.tw
  • use after free
  • html injection
  • theFaunia course
more
«   2025/07   »
일 월 화 수 목 금 토
1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31
Archives

Blog is powered by Tistory / Designed by Tistory

티스토리툴바