Go to index Menu

Pwning stuffs

프로필사진
  • New Post
  • Management
  • Tags
  • Guestbook
  • RSS

Pwning stuffs

Search form
  • 분류 전체보기 (25)
    • Pwning in Linux (15)
    • Windows Exploiting (4)
    • Cracking (4)
    • ARM Exploiting (0)
    • Web Hacking (1)
    • Reversing (0)
    • Crypto (0)
    • Cloud (0)
  • guestbook

return oriented programming (3)
Writeup: 3x17

We will start by looking at the protections of the binary and we realize that NX is enabled so it will not let us execute code in memory. First we see that our attack vector are two inputs but we do not know the iteration that the program returns to us. So we will have to open gdb and analyze the code in search of how to exploit it and perform the important task of reverse engineering. After see..

Pwning in Linux 2019. 3. 27. 05:02
Armoury - Pragyan CTF 19

Writeup - From Format String to Buffer OverflowPKTeam Recon First of all we see the protections of the binary. We have several problems. We can not execute code in the stack such as a shellcode due to NX, we can not overflow without having a canary leak and if we want to attach with gdb we have to bypass PIE as if we want to do ROP (Return-Oriented Programming). We also need leak of a function t..

Pwning in Linux 2019. 3. 10. 21:40
Basics Return-oriented programming

Horcruxes Date: 05/01/2019-08/01/2019 @naivenom 3.1 Deep Reversing Analysis Primero vemos las protecciones y tiene NX habilitado en áreas como no ejecutable. gdb-peda$ checksec CANARY : disabled FORTIFY : disabled NX : ENABLED PIE : disabled RELRO : Partial Vemos las funciones que usa el binario, Non-debugging symbols: 0x0809fbec _init 0x0809fc20 seccomp_init@plt 0x0809fc30 read@plt 0x0809fc40 p..

Pwning in Linux 2019. 2. 28. 17:41
Prev 1 Next
Prev Next
Notice
Recent Posts
Recent Comments
Total
Today
Yesterday
Link
TAG
  • canary
  • stack pivot
  • dnspy
  • buffer overflow
  • theFaunia course
  • 32Bit
  • x64dbg
  • open-redirect
  • Pwnable.kr
  • pwnable.tw
  • return oriented programming
  • arithmetic overflow/underflow
  • GOT Dereferencing/Overwriting
  • pwnable.xyz
  • write primitive
  • Windows
  • use after free
  • html injection
  • leak libc
  • fake stack frame
  • XSS
  • format string
  • Call oriented programming
  • leak stack memory address
  • shellcode
  • cracking
  • Backdoors
  • hijacking redirection flow
  • one gadget
  • ASM
more
«   2026/02   »
일 월 화 수 목 금 토
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
Archives

Blog is powered by Tistory / Designed by Tistory

티스토리툴바