Now let's put everything together and learn how to exploit binaries.
Recorded Lectures:
11/22/23 Binary Security Pt. 1:
11/27/23 Binary Security Pt. 2:
11/29/23 Binary Security Pt. 3:
The excellent Zardus (creator of pwn.college) has recorded lectures and slides that might be useful:
Exploit a (memory corruption) stack injection vulnerability
Write and execute shellcode to read the flag!
Write and execute shellcode to read the flag, but a portion of your input is randomly skipped.
Write and execute shellcode to read the flag, but your inputted data is filtered before execution.
Overflow a buffer on the stack to set the right conditions to obtain the flag!
Overflow a buffer on the stack to set trickier conditions to obtain the flag!
Overflow a buffer and smash the stack to obtain the flag!
Overflow a buffer and smash the stack to obtain the flag, but this time bypass another check designed to prevent you from doing so!
Overflow a buffer and smash the stack to obtain the flag, but this time in a position independent (PIE) binary!
Overflow a buffer and smash the stack to obtain the flag, but this time in a position independent (PIE) binary with an additional check on your input.
Overflow a buffer and leak the flag. Be warned, this requires careful and clever payload construction!
Write a full exploit involving shellcode and a method of tricking the challenge into executing it.
Write a full exploit involving injecting shellcode and a method of tricking the challenge into executing it. Note, ASLR is disabled!
This scoreboard reflects solves for challenges in this module after the module launched in this dojo.
7-Day | 30-Day | All-Time