Information security project. This is a collection of ELF Binary exploits to better understand how memory works.
Level | Ressources | Exploit |
---|---|---|
0 | EAX register | Simple reverse engineering |
1 | EIP register | Byte order | cat |
Buffer overflow attack |
2 | ret2libc attack | |
3 | printf() |
format string attack |
4 | format string attack | |
5 | format string attack | GOT overwrite | |
6 | strcpy() |
Buffer overflow attack |
7 | Buffer overflow attack | GOT overwrite | |
8 | Simple reverse engineering | |
9 | Buffer overflow attack | |
bonus0 | shell-storm | exploit-db | Shellcode injection |
bonus1 | Integer underflow | Buffer overflow attack | |
bonus2 | Shellcode injection | |
bonus3 | Simple reverse engineering |