Binary Exploitation - (Level 4) flag

Challenge Description

Papa brought me a packed present! let’s open it. Download. This is reversing task. all you need is binary

From the description seems like it is a reverse engineering task. Let’s download the binary and load it up in ghidra.

Read More

Binary Exploitation - (Level 3) BOF

Challenge Description

Nana told me that buffer overflow is one of the most common software vulnerability. Is that true?

This challenge is a classic buffer overflow but to interact with the program we have to connect to the remote server, and this simple challenge is a very good example of remote exploitation.

Read More

Testing Linux Heap exploits on different Glibc version (with source-level debugging setup)

Recently I am learning about Linux Heap exploitation and I came across some really good Phrack papers and blogs which explained different type of attacks in varying conditions, I have included the link of these blogs and papers in the next section. I also came across an amazing GitHub project How2Heap by shellpish team, this project has the example exploit code for various heap exploitation technique of different versions of Glibc out there in public, which help me to get a better understanding of how those attacks played out. That project also included a script to build Glibc with any version of your choice and test the exploit on that version.

Read More
Your browser is out-of-date!

Update your browser to view this website correctly.&npsb;Update my browser now

×