This level explores why you should always explicitly initialize your allocated memory, and what can occur when pointer values go stale … Continue readingExploit Education | Phoenix | Heap Three Solution
Author: Andrew Lamarra
Exploit Education | Phoenix | Heap Two Solution
This level explores why you should always explicitly initialize your allocated memory, and what can occur when pointer values go stale … Continue readingExploit Education | Phoenix | Heap Two Solution
Exploit Education | Phoenix | Heap One Solution
This level explores what can be done with data overwrites … Continue readingExploit Education | Phoenix | Heap One Solution
Exploit Education | Phoenix | Heap Zero Solution
This level provides an introduction to heap data manipulation, and how that can affect program execution … Continue readingExploit Education | Phoenix | Heap Zero Solution
Exploit Education | Phoenix | Format Four Solution
This level introduces writing to memory in such a way that you can control code execution … Continue readingExploit Education | Phoenix | Format Four Solution
Exploit Education | Phoenix | Format Three Solution
This level introduces writing specific values to memory, and how that can be accomplished … Continue readingExploit Education | Phoenix | Format Three Solution
Exploit Education | Phoenix | Format Two Solution
This level introduces being able to write to specific areas of memory to modify program execution … Continue readingExploit Education | Phoenix | Format Two Solution
Exploit Education | Phoenix | Format One Solution
Even more format string fun! … Continue readingExploit Education | Phoenix | Format One Solution
Exploit Education | Phoenix | Format Zero Solution
This level introduces format strings, and how attacker supplied format strings can modify program execution … Continue readingExploit Education | Phoenix | Format Zero Solution
Exploit Education | Phoenix | Net Two Solution
And now for some additional fun … Continue readingExploit Education | Phoenix | Net Two Solution