Last project of the exploit branch at 42 - Override
- A collection of 10 levels related to binary analysis/exploitation
- For each level i had to reverse the binary (source) and exploit it (ressources/readme.txt)
Level | Topic | Flag |
---|---|---|
level00 | Binary analysis | uSq2ehEGT6c9S24zbshexZQBXUGrncxn5sD5QfGL |
level01 | fgets overflow | PwBLgNa8p8MTKW57S7zxVAQCxnCpV8JqTTs9XEBv |
level02 | Binary analysis / format string exploit | Hh74RPnuQ9sa5JAEXgNWCqz7sXGnh5J5M9KfPg3H |
level03 | Reverse engineering | kgv3tkEb9h2mLkRsPkXRfc2mHbjMxQzvb2FrgKkf |
level04 | gets overflow in a child process | 3v8QLcN5SAhPaZZfEasfmXdwyR59ktDEMAwHF3aN |
level05 | GOT overwriting with a format string exploit to jump in an execve shellcode | h4GtNnaMs2kZFN92ymTr2DcJHAzMfzLW25Ep59mq |
level06 | Binary patching to bypass antidebug technique | GbcPDRgsFK77LNnnuh7QyFYA2942Gp8yKj9KrWD8 |
level07 | Int overflow to jump in our ret2libc shellcode | 7WJ6jFBzrcjEYXudxnM3kdW7n3qyxR6tk2xGrkSC |
level08 | Binary analysis | fjAwpJNs2vvkFLRebEvAQ2hFZ4uQBWfHRsP62d8S |
level09 (Bonus) | 1 byte overflow leading to an exploit of strncpy | j4AunAPDXaJxxWjYEUxpanmvSgRDV3tpA5BEaBuE |