Binary Exploitation [pwnable.kr] - (Level 4) flag
#Challenge Description
| Name | flag |
| Points | 7 |
| Solves | 10695 times |
| Category | Exploitation |
| Description | Papa brought me a packed present! let’s open it. This is reversing task. all you need is binary |
Binary Exploitation [pwnable.kr] - (Level 4) flag
| Name | flag |
| Points | 7 |
| Solves | 10695 times |
| Category | Exploitation |
| Description | Papa brought me a packed present! let’s open it. This is reversing task. all you need is binary |
Binary Exploitation [pwnable.kr] - (Level 3) BOF
| Name | BOF |
| Points | 7 |
| Solves | 12586 times |
| Category | Exploitation |
| Description | Nana told me that buffer overflow is one of the most common software vulnerability. Is that true? |
Binary Exploitation [pwnable.kr] - (Level 2) Collision
| Name | BOF |
| Points | 7 |
| Solves | 12586 times |
| Category | Exploitation |
| Description | Daddy told me about cool MD5 hash collision today. I wanna do something like that too! |
Binary Exploitation [pwnable.kr] - (Level 1) FD
| Name | FD |
| Points | 7 |
| Solves | 12586 times |
| Category | Exploitation |
| Description | Mommy! what is a file descriptor in Linux? |
Linux Binary Exploitation Series (with pwnable.kr)
There’s no use talking about the problem unless you talk about the solution.
This is a kick-off post for the series of post on The War Game pwnable.kr. It’s focused on Linux Exploitation.
Testing Linux Heap exploits on different Glibc version (with source-level debugging setup)
Recently I am learning about Linux Heap exploitation and I came across some really good Phrack papers and blogs which explained different type of attacks in varying conditions, I have included the link of these blogs and papers in the next section. I also came across an amazing GitHub project How2Heap by shellpish team, this project has the example exploit code for various heap exploitation technique of different versions of Glibc out there in public, which help me to get a better understanding of how those attacks played out. That project also included a script to build Glibc with any version of your choice and test the exploit on that version.
Update your browser to view this website correctly.&npsb;Update my browser now