Skip to content
CTFs & Stuff

CTFs & Stuff

CTF Walkthroughs, Challenge Solutions, etc.

  • Home
  • About Me
  • Exploit Education
    • Phoenix Solutions
      • Setup
      • Stack Levels
        • Stack Zero Solution
        • Stack One Solution
        • Stack Two Solution
        • Stack Three Solution
        • Stack Four Solution
        • Stack Five Solution
        • Stack Six Solution
      • Format Levels
        • Format Zero Solution
        • Format One Solution
        • Format Two Solution
        • Format Three Solution
        • Format Four Solution
      • Heap Levels
        • Heap Zero Solution
        • Heap One Solution
        • Heap Two Solution
        • Heap Three Solution
      • Net Levels
        • Net Zero Solution
        • Net One Solution
        • Net Two Solution
      • Final Levels
        • Final Zero Solution
        • Final One Solution
        • Final Two Solution
    • Fusion Solutions
      • Setup
      • Level 00 Solution
      • Level 01 Solution
      • Level 02 Solution
      • Level 03 Solution
      • Level 04 Solution
      • Level 05 Solution
  • ROP Emporium
    • Setup
    • ret2win Solution
    • split Solution
    • callme Solution
    • write4 Solution
    • badchars Solution
    • fluff Solution
    • pivot Solution
    • ret2csu Solution
  • GitHub
  • Twitter
  • Stack Overflow
Home>2019>July

Month: July 2019

Cat Links Solutions

Exploit Education | Phoenix | Format Three Solution

This level introduces writing specific values to memory, and how that can be accomplished … Continue readingExploit Education | Phoenix | Format Three Solution

Posted-onJuly 31, 2019August 16, 2019By lineBylineamlamarra
Cat Links Solutions

Exploit Education | Phoenix | Format Two Solution

This level introduces being able to write to specific areas of memory to modify program execution … Continue readingExploit Education | Phoenix | Format Two Solution

Posted-onJuly 19, 2019August 16, 2019By lineBylineamlamarra
Cat Links Solutions

Exploit Education | Phoenix | Format One Solution

Even more format string fun! … Continue readingExploit Education | Phoenix | Format One Solution

Posted-onJuly 18, 2019August 16, 2019By lineBylineamlamarra
Cat Links Solutions

Exploit Education | Phoenix | Format Zero Solution

This level introduces format strings, and how attacker supplied format strings can modify program execution … Continue readingExploit Education | Phoenix | Format Zero Solution

Posted-onJuly 18, 2019December 15, 2020By lineBylineamlamarra
Cat Links Solutions

Exploit Education | Phoenix | Net Two Solution

And now for some additional fun … Continue readingExploit Education | Phoenix | Net Two Solution

Posted-onJuly 16, 2019August 16, 2019By lineBylineamlamarra
Cat Links Solutions

Exploit Education | Phoenix | Net One Solution

Can you convert the native endian representation of an integer to the ascii equivalent? … Continue readingExploit Education | Phoenix | Net One Solution

Posted-onJuly 12, 2019August 16, 2019By lineBylineamlamarra
Cat Links Solutions

Exploit Education | Phoenix | Net Zero Solution

Can you convert string provided to the native endian of the architecture the binary is running on? … Continue readingExploit Education | Phoenix | Net Zero Solution

Posted-onJuly 11, 2019August 16, 2019By lineBylineamlamarra
Cat Links Solutions

Exploit Education | Phoenix | Stack Six Solution

Where does Stack Six go wrong, and what can you do with it? … Continue readingExploit Education | Phoenix | Stack Six Solution

Posted-onJuly 10, 2019November 8, 2019By lineBylineamlamarra
Cat Links Solutions

Exploit Education | Phoenix | Stack Five Solution

As opposed to executing an existing function in the binary, this time we’ll be introducing the concept of “shell code”, and being able to execute our own code … Continue readingExploit Education | Phoenix | Stack Five Solution

Posted-onJuly 9, 2019August 16, 2019By lineBylineamlamarra
Cat Links Solutions

Exploit Education | Phoenix | Stack Four Solution

Stack Four takes a look at what can happen when you can overwrite the saved instruction pointer (standard buffer overflow) … Continue readingExploit Education | Phoenix | Stack Four Solution

Posted-onJuly 9, 2019August 16, 2019By lineBylineamlamarra

Posts navigation

Older posts

Recent Posts

  • WinDbg Cheat Sheet
  • Exploit Education | Fusion | Level 05 Solution
  • Exploit Education | Fusion | Level 04 Solution
  • Exploit Education | Fusion | Level 03 Solution
  • Exploit Education | Fusion | Level 02 Solution

Recent Comments

  • Edw590 on Exploit Education | Phoenix | Format Four Solution
  • Lopterion on Exploit Education | Phoenix | Setup
  • Johnny on TrollCave 1.2 Walkthrough
  • Johnny on TrollCave 1.2 Walkthrough
  • Andrew Lamarra on Exploit Education | Fusion | Level 05 Solution

Archives

  • July 2021
  • May 2021
  • March 2020
  • February 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • March 2019
  • July 2018
  • January 2018
  • November 2017
  • October 2017

Categories

  • Blog Posts
  • Solutions
  • VulnHub Walkthroughs

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
  • GitHub
  • Twitter
  • Stack Overflow
Copyright © 2025 CTFs & Stuff | Rock Band by Catch Themes
Scroll Up