This level introduces writing specific values to memory, and how that can be accomplished … Continue readingExploit Education | Phoenix | Format Three Solution
Month: July 2019
Exploit Education | Phoenix | Format Two Solution
This level introduces being able to write to specific areas of memory to modify program execution … Continue readingExploit Education | Phoenix | Format Two Solution
Exploit Education | Phoenix | Format One Solution
Even more format string fun! … Continue readingExploit Education | Phoenix | Format One Solution
Exploit Education | Phoenix | Format Zero Solution
This level introduces format strings, and how attacker supplied format strings can modify program execution … Continue readingExploit Education | Phoenix | Format Zero Solution
Exploit Education | Phoenix | Net Two Solution
And now for some additional fun … Continue readingExploit Education | Phoenix | Net Two Solution
Exploit Education | Phoenix | Net One Solution
Can you convert the native endian representation of an integer to the ascii equivalent? … Continue readingExploit Education | Phoenix | Net One Solution
Exploit Education | Phoenix | Net Zero Solution
Can you convert string provided to the native endian of the architecture the binary is running on? … Continue readingExploit Education | Phoenix | Net Zero Solution
Exploit Education | Phoenix | Stack Six Solution
Where does Stack Six go wrong, and what can you do with it? … Continue readingExploit Education | Phoenix | Stack Six Solution
Exploit Education | Phoenix | Stack Five Solution
As opposed to executing an existing function in the binary, this time we’ll be introducing the concept of “shell code”, and being able to execute our own code … Continue readingExploit Education | Phoenix | Stack Five Solution
Exploit Education | Phoenix | Stack Four Solution
Stack Four takes a look at what can happen when you can overwrite the saved instruction pointer (standard buffer overflow) … Continue readingExploit Education | Phoenix | Stack Four Solution