Advanced area of attack and defense world experts - stack2

Advanced area of attack and defense world experts - stack2 Look at the title, nothing 1, Analysis file checksec It is found that there is stack overflow protection, which has not been seen before. There may be new knowledge points. Run file It seems to be a program for inputting numbers to calculate the average value. ida open unsig ...

Added by minifairy on Thu, 24 Feb 2022 15:59:12 +0200

A summary of winter vacation

1.ret2shellcode Quote ciscn_ 2019_ n_ five Open the main function and find that get is still a stack overflow, but shift has no bin and system, and no protection is turned on. When a name variable is opened, it is found to exist on the bss side. Therefore, you want to write the name directly to shellcode, and adjust get to the name func ...

Added by manimoor on Sat, 19 Feb 2022 07:23:17 +0200

Format string learning

Common formatting string functions Output: functionBasic introductionprintfOutput to stdoutfprintfOutput to the specified FILE streamvprintfFormat the output to stdout according to the parameter listvfprintfFormat the output to the specified FILE stream according to the parameter listsprintfOutput to stringsnprintfOutputs the specified number ...

Added by bunner bob on Mon, 17 Jan 2022 14:28:27 +0200

Stack migration of PWN questions

preface Vegetable chicken summary, if there is something wrong, I hope you can give advice in time to avoid harming people's children. 0x1: basic knowledge: Everyone must know the problem solved by stack migration technology - the overflow length is not enough and can only cover the return address. As for the length of the rop chain to ...

Added by suepahfly on Thu, 06 Jan 2022 02:49:00 +0200

[pwn learning] format character vulnerability

What is a format character vulnerability The format string function can accept a variable number of parameters, take the first parameter as the format string, and parse the parameters according to it. Generally speaking, the format string function is to convert the data represented in computer memory into a human readable string format. Al ...

Added by jiayanhuang on Wed, 29 Dec 2021 18:52:22 +0200

Format string processing on bss [buuoj] SWPUCTF_2019_login

This problem is done in two ways: one is to modify the got table, and the other is to modify the return value to control the execution flow. IDA analysis There is an obvious format string vulnerability, but it is on the bss segment To sum up, the processing method of 32-bit format string in bss segment is to find an ebp like stack register, ...

Added by Codewarrior123 on Sun, 26 Dec 2021 08:18:34 +0200

Kernel rop attack 2018QWBcore replay

Foreword: I just started the core problem recently, so I'll learn from ctfwiki here. Don't spray... The first step is classic... If the title is not given to vmlinux, it can be extracted through extract vmlinux. See start SH finds that kalsr randomization is enabled, and the base address needs to be leaked. This is very similar to the pwn pro ...

Added by turkman on Sat, 18 Dec 2021 20:57:35 +0200

Fancy stack overflow

Fancy stack overflow reference resources: https://ctf-wiki.org/pwn/linux/user-mode/stackoverflow/x86/fancy-rop/#2018-over reference resources: https://www.yuque.com/hxfqg9/bin/erh0l7 reference resources: https://ctf-wiki.org/pwn/linux/user-mode/stackoverflow/x86/fancy-rop 1. Principle 1.1 stack pivoting Stack pivoting is turned into s ...

Added by beckjo1 on Tue, 05 Oct 2021 01:44:29 +0300