Skip to content
This repository has been archived by the owner on May 3, 2022. It is now read-only.
/ 42-Rainfall Public archive

Information security project. This is a collection of ELF binaries exploits to better understand how memory works.

License

Notifications You must be signed in to change notification settings

kibotrel/42-Rainfall

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

38 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

42-Rainfall

Information security project. This is a collection of ELF Binary exploits to better understand how memory works.

Breakdown

Level Ressources Exploit
0 EAX register Simple reverse engineering
1 EIP register | Byte order | cat Buffer overflow attack
2 ret2libc attack
3 printf() format string attack
4 format string attack
5 format string attack | GOT overwrite
6 strcpy() Buffer overflow attack
7 Buffer overflow attack | GOT overwrite
8 Simple reverse engineering
9 Buffer overflow attack
bonus0 shell-storm | exploit-db Shellcode injection
bonus1 Integer underflow | Buffer overflow attack
bonus2 Shellcode injection
bonus3 Simple reverse engineering