Hegzploit

  • Home

  • About

  • Posts

  • Categories

  • Tags


Babiersteps

May 01, 2022 [Binary Exploitation] #NahamCon CTF 2022 #ret2win #Basic Exploitation

A classic ret2win challenge on a 64-bit binary, overflow RIP with win() address to get flag. ...more

Babysteps

May 01, 2022 [Binary Exploitation] #NahamCon CTF 2022 #ret2shellcode

A classic ret2shellcode with a twist, we use a gadget to execute our code off the stack. binary is 32-bit. ...more

Detour

May 01, 2022 [Binary Exploitation] #NahamCon CTF 2022 #relocations overwrite #No RELO

A write-what-where scenario that enables us to overwrite the destructor (dtor) in the relocations table with our win() function to get a shell. ...more

Dweeno

May 01, 2022 [Hardware] #NahamCon CTF 2022 #Arduino #reverse engineering

A hardware challenge where we're given some serial output from a Arduino and the corresponding wiring diagram and encryption source code. ...more

Fighting counterfeit USB Flash Drives

April 10, 2022

I found a listing for a 2TB usb flash drive on AliExpress for less than $3 I bought It and after 24 days, I recieved my order and started analyzing it. ...more

  • 1
  • 2
  • 3
  • 4
Next >

Recent Posts

Babiersteps
Babysteps
Detour
Dweeno
Fighting counterfeit USB Flash Drives
Emotion and Logic
Ways to return function values in C
My new blogging workflow
Binary Exploitation Resources

Copyright © 2022 Hegzploit