Can you convert the native endian representation of an integer to the ascii equivalent? … Continue readingExploit Education | Phoenix | Net One Solution
News
Exploit Education | Phoenix | Net Zero Solution
Can you convert string provided to the native endian of the architecture the binary is running on? … Continue readingExploit Education | Phoenix | Net Zero Solution
Exploit Education | Phoenix | Stack Six Solution
Where does Stack Six go wrong, and what can you do with it? … Continue readingExploit Education | Phoenix | Stack Six Solution
Exploit Education | Phoenix | Stack Five Solution
As opposed to executing an existing function in the binary, this time we’ll be introducing the concept of “shell code”, and being able to execute our own code … Continue readingExploit Education | Phoenix | Stack Five Solution
Exploit Education | Phoenix | Stack Four Solution
Stack Four takes a look at what can happen when you can overwrite the saved instruction pointer (standard buffer overflow) … Continue readingExploit Education | Phoenix | Stack Four Solution
Exploit Education | Phoenix | Stack Three Solution
Stack Three looks at overwriting function pointers stored on the stack … Continue readingExploit Education | Phoenix | Stack Three Solution
Exploit Education | Phoenix | Stack Two Solution
Stack Two takes a look at environment variables, and how they can be set … Continue readingExploit Education | Phoenix | Stack Two Solution
Exploit Education | Phoenix | Stack One Solution
This level looks at the concept of modifying variables to specific values in the program, and how the variables are laid out in memory … Continue readingExploit Education | Phoenix | Stack One Solution
Exploit Education | Phoenix | Stack Zero Solution
This level introduces the concept that memory can be accessed outside of its allocated region, how the stack variables are laid out, and that modifying outside of the allocated memory can modify program execution … Continue readingExploit Education | Phoenix | Stack Zero Solution
Exploit Education | Phoenix | Setup
I’ll be working through the Phoenix challenges and posting my solution to each level. This initial post will describe how to get setup to follow along … Continue readingExploit Education | Phoenix | Setup