Go to index Menu

Pwning stuffs

프로필사진
  • New Post
  • Management
  • Tags
  • Guestbook
  • RSS

Pwning stuffs

Search form
  • 분류 전체보기 (25)
    • Pwning in Linux (15)
    • Windows Exploiting (4)
    • Cracking (4)
    • ARM Exploiting (0)
    • Web Hacking (1)
    • Reversing (0)
    • Crypto (0)
    • Cloud (0)
  • guestbook

one gadget (1)
Armoury - Pragyan CTF 19

Writeup - From Format String to Buffer OverflowPKTeam Recon First of all we see the protections of the binary. We have several problems. We can not execute code in the stack such as a shellcode due to NX, we can not overflow without having a canary leak and if we want to attach with gdb we have to bypass PIE as if we want to do ROP (Return-Oriented Programming). We also need leak of a function t..

Pwning in Linux 2019. 3. 10. 21:40
Prev 1 Next
Prev Next
Notice
Recent Posts
Recent Comments
Total
Today
Yesterday
Link
TAG
  • GOT Dereferencing/Overwriting
  • leak libc
  • fake stack frame
  • write primitive
  • use after free
  • return oriented programming
  • pwnable.xyz
  • x64dbg
  • canary
  • buffer overflow
  • one gadget
  • dnspy
  • Backdoors
  • shellcode
  • pwnable.tw
  • 32Bit
  • stack pivot
  • hijacking redirection flow
  • arithmetic overflow/underflow
  • Pwnable.kr
  • html injection
  • ASM
  • open-redirect
  • cracking
  • Windows
  • XSS
  • leak stack memory address
  • theFaunia course
  • format string
  • Call oriented programming
more
«   2025/07   »
일 월 화 수 목 금 토
1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31
Archives

Blog is powered by Tistory / Designed by Tistory

티스토리툴바