Linux Exploit Development - ctf
Name | Level, Description, Solution |
---|---|
Tokyo Westerns/MMA CTF 2nd 2016: greeting | Baby, Format String + Overwrite GOT and .fini_array section, Video, Exploit |
DEF CON CTF Qualifier 2016: xkcd | Baby, Heartbleed, Video, Exploit |
DEF CON CTF Qualifier 2015: babyecho | Baby, Format string + leak memory address + bypass ASLR, Exploit |
CSAW CTF Qualification Round 2013: Exploitation 200 | Baby, Shellcode + leak self-implementation canary, Exploit |
EBCTF 2013: PWN 200 Brainfuck | Baby, ++ pointer + Underflow to get system function, Exploit |
X-MAS CTF 2019: Sn0wverfl0w | Easy, ret2libc with leak, Binary |
Windows Exploit Development - Exercises from CLS Exploits
Name | Level, Description, Solution |
---|---|
Level 1b | Baby, Buffer Overflow overwriting random value with bypass jl condition, Solve |
Level 2 | Baby, Buffer Overflow overwriting a cte value and bypass check because of strcpy, Solve |
Level 3 | Baby, Buffer Overflow overwriting a cte value and bypass check because of strcpy (Part 2), Solve |
Level 4 | Baby, Bypass check with strcpy and overflow, Solve |
Level 5 | Baby, Heap allocation and bypass Anti-Debugging, Solve |
Level 6 | Baby, Overflow for using strcat string concatenate + flag decision, Solve |
Level 7 | Baby, Overwrite RET with memory address to win |