일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | 6 | |
7 | 8 | 9 | 10 | 11 | 12 | 13 |
14 | 15 | 16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 | 26 | 27 |
28 | 29 | 30 |
- writeup
- Toddler's Bottle
- Bug
- practicalmalwareanalysis
- rev
- string
- Bottle
- reversing
- format
- ASM
- 2018
- CTF
- TUCTF
- BOF
- anti
- pwnable
- CANARY
- Leak
- shellcraft
- PMA
- toddler
- pwn
- picoCTF
- pico
- shellcode
- pwnable.kr
- FSB
- Read
- Reverse
- Rookiss
- Today
- Total
목록shellcode (7)
제리의 블로그
TUCTF 2018 PWN shella-easy $ ./shella-easy Yeah I'll have a 0xff81fcb0 with a side of fries thanks 프로그램을 실행시켜보면 오프셋을 보여준다. int __cdecl main(int argc, const char **argv, const char **envp) { char s; // [sp+0h] [bp-48h]@1 unsigned int v5; // [sp+40h] [bp-8h]@1 setvbuf(stdout, 0, 2, 0x14u); setvbuf(stdin, 0, 2, 0x14u); v5 = 0xCAFEBABE; printf("Yeah I'll have a %p with a side of fries thanks\n", &s)..
Description What does asm3(0xb3fb1998,0xfe1a474d,0xd5373fd4) return? Submit the flag as a hexadecimal value (starting with '0x'). NOTE: Your submission for this question will NOT be in the normal flag format. Source located in the directory at /problems/assembly-3_0_64e940c92852f106e798ceac9b22aa25. end_asm_rev.S: .intel_syntax noprefix .bits 32 .global asm3 asm3: push ebp mov ebp,esp mov eax,0x..
programSource #include #include #include #include #include #define BUFSIZE 148 #define FLAGSIZE 128 void vuln(char *buf){ gets(buf); puts(buf); } int main(int argc, char **argv){ setvbuf(stdout, NULL, _IONBF, 0); // Set the gid to the effective gid // this prevents /bin/sh from dropping the privileges gid_t gid = getegid(); setresgid(gid, gid, gid); char buf[BUFSIZE]; puts("Enter a string!"); vu..
asm - 6 pt Mommy! I think I know how to make shellcodes ssh asm@pwnable.kr -p2222 (pw: guest)쉘코드를 만드는 문제인가 봅니다.일단 ssh 접속해볼까요? asm@ubuntu:~$ ls -l total 28 -rwxr-xr-x 1 root root 13704 Nov 29 2016 asm -rw-r--r-- 1 root root 1793 Nov 29 2016 asm.c -rw-r--r-- 1 root root 211 Nov 19 2016 readme -rw-r--r-- 1 root root 67 Nov 19 2016 this_is_pwnable.kr_flag_file_please_read_this_file.sorry_the_file_na..
보호되어 있는 글입니다.
보호되어 있는 글입니다.
#asm, #bof, #shellcodeOnline Banking90 points Binary Exploitation - Unsolved (100 solves)Written by nthistle Try out our new online banking service! nc problem1.tjctf.org 8005 Binary Source 취약점 발견 7 int verify_pin(char* pin) { 8 char pin_check[PIN_SIZE+1]; 9 printf("Please verify your PIN first:\nPIN: "); 10 fgets(pin_check, NAME_SIZE+1, stdin); 11 for(int i = 0; i < 4; i ++) { 12 if(pin[i] != p..