Babiersteps
May 01, 2022 [Binary Exploitation] #NahamCon CTF 2022 #ret2win #Basic Exploitation
A classic ret2win challenge on a 64-bit binary, overflow RIP with win()
address to get flag.
...more
A classic ret2win challenge on a 64-bit binary, overflow RIP with win()
address to get flag.
...more
A classic ret2shellcode with a twist, we use a gadget to execute our code off the stack. binary is 32-bit. ...more
A write-what-where scenario that enables us to overwrite the destructor (dtor) in the relocations table with our win() function to get a shell. ...more
A hardware challenge where we're given some serial output from a Arduino and the corresponding wiring diagram and encryption source code. ...more
I found a listing for a 2TB usb flash drive on AliExpress for less than $3 I bought It and after 24 days, I recieved my order and started analyzing it. ...more