Notice
Recent Posts
Recent Comments
Link
일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | ||||||
2 | 3 | 4 | 5 | 6 | 7 | 8 |
9 | 10 | 11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 | 21 | 22 |
23 | 24 | 25 | 26 | 27 | 28 |
Tags
- PMA
- string
- practicalmalwareanalysis
- pwnable.kr
- FSB
- CTF
- CANARY
- picoCTF
- ASM
- Bug
- Leak
- writeup
- format
- Bottle
- 2018
- rev
- Rookiss
- pwn
- BOF
- toddler
- pico
- TUCTF
- Toddler's Bottle
- Read
- pwnable
- shellcraft
- anti
- shellcode
- Reverse
- reversing
Archives
- Today
- Total
목록Free (1)
제리의 블로그
picoCTF 2018 are you root? Binary Exploit
are you root? - Points: 550 - (Solves: 253) DescriptionCan you get root access through this service and get the flag? Connect with nc 2018shell2.picoctf.com 41208. Source.HintIf only the program used calloc to zero out the memory..auth.c#include #include #include #include typedef enum auth_level { ANONYMOUS = 1, GUEST = 2, USER = 3, ADMIN = 4, ROOT = 5 } auth_level_t; struct user { char *name; a..
CTF/pwnable
2018. 11. 2. 01:09