Wargames
Exploit Exercises - …
This challenge is very similar to the previous one. The main difference is that instead of just validating that the “modified” value was changed, it validates that it was changed to a specific value, 0x61626364, or “dcba” in ASCII.
#include <stdlib.h>
#include …Exploit Exercises - …
Challenge 10 is another nostalgic one for me. Back when I was first starting with linux, I remember reading about overflows and race conditions. This challenge is the latter, a race condition.
We’re given a C/C++ app to exploit:
#include <stdlib.h>
#include <unistd.h>
#include …Exploit Exercises - …
Challenge 09 gave me the most issues out of any other challenge so far. This may just be because I haven’t touched PHP since version 3 was just coming out. However, it is based on a dangerous function, known as preg_replace(). There are several more dangerous functions, some of which can be …
Exploit Exercises - …
Challenge 08 is more of a real-world challenge than some of the others have been. It’s also very dear to my heart, getting back to my networking roots.
You are instructed simply to check out what the level08 user has been up to. This is fairly easy, since when you login as level08, you see …
Exploit Exercises - …
This next challenge is a little bit more tricky than some of the previous ones. There’s a lot more code involved, but it’s not too bad.
In the flag07 home directory, you’ll find the configuration for a simple http server, thttpd.conf. Inside, you’ll find that it’s …