Exploit-Exercises
Exploit Exercises - …
This challenge starts getting a little bit more involved than the previous ones. Instead of just providing a new value for the “modified” variable, we need to make the code jump to a method, changing the execution.
#include <stdlib.h>
#include <unistd.h>
#include …Exploit Exercises - …
This challenge is pretty much the same as the previous challenge, except that the buffer comes from an environmental variable.
#include <stdlib.h>
#include <unistd.h>
#include <stdio.h>
#include <string.h>
int main(int argc, char **argv)
{
volatile int modified;
char …Exploit Exercises - …
This challenge is very similar to the previous one. The main difference is that instead of just validating that the “modified” value was changed, it validates that it was changed to a specific value, 0x61626364, or “dcba” in ASCII.
#include <stdlib.h>
#include …Exploit Exercises - …
Challenge 10 is another nostalgic one for me. Back when I was first starting with linux, I remember reading about overflows and race conditions. This challenge is the latter, a race condition.
We’re given a C/C++ app to exploit:
#include <stdlib.h>
#include <unistd.h>
#include …Exploit Exercises - …
Challenge 09 gave me the most issues out of any other challenge so far. This may just be because I haven’t touched PHP since version 3 was just coming out. However, it is based on a dangerous function, known as preg_replace(). There are several more dangerous functions, some of which can be …