Armoury - Pragyan CTF 19
Writeup - From Format String to Buffer OverflowPKTeam Recon First of all we see the protections of the binary. We have several problems. We can not execute code in the stack such as a shellcode due to NX, we can not overflow without having a canary leak and if we want to attach with gdb we have to bypass PIE as if we want to do ROP (Return-Oriented Programming). We also need leak of a function t..
Pwning in Linux
2019. 3. 10. 21:40
Notice
Recent Posts
Recent Comments
- Total
- Today
- Yesterday
Link
TAG
- 32Bit
- theFaunia course
- leak stack memory address
- ASM
- canary
- Call oriented programming
- dnspy
- Pwnable.kr
- hijacking redirection flow
- open-redirect
- cracking
- stack pivot
- write primitive
- return oriented programming
- leak libc
- XSS
- x64dbg
- Backdoors
- GOT Dereferencing/Overwriting
- format string
- one gadget
- shellcode
- pwnable.tw
- html injection
- pwnable.xyz
- fake stack frame
- arithmetic overflow/underflow
- Windows
- buffer overflow
- use after free
일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | |||
5 | 6 | 7 | 8 | 9 | 10 | 11 |
12 | 13 | 14 | 15 | 16 | 17 | 18 |
19 | 20 | 21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 | 31 |
Archives