Pwn

SRNR

2019-08-16T18:33:19+02:00

Srnr is a binary exploitation challenge of redpwn ctf. Running checksec, we can see that there are only Full RELRO and NX protections, but any canary value.

SRNR2019-08-16T18:33:19+02:00

Jendy’s

2019-03-11T15:25:41+02:00

Hey guys, welcome back on Exploitnetoworking! Today we will see the writeup of the binary exploitation challenge Jendy’s by UTCTF. This challenge is an hard pwn binary, that for exploit it, you must use two technics, the first step is manage the heap for obtain an arbitrary free and the second step is use a format string for obtain a write what where.

Jendy’s2019-03-11T15:25:41+02:00

PingPong

2018-09-14T14:04:41+02:00

Welcome back on Exploitnetworking! PingPong was a pwn challenge of SECT CTF 2018, based on buffer overflow. The main goal was use an overflow to leak the memory addresses of remote libc (for bypass aslr) and then create a ropchain for spawn a shell.

PingPong2018-09-14T14:04:41+02:00

Simple yet elegent pwn

2018-08-17T21:49:18+02:00

Hey guys, it’s just finished the HackCon18 ctf, let’s see the writeup of Simple Yet Elegent pwn. This pwn is based on format string vulnerability and buffer overflow, then our target is leak an address of libc with the format string (because we suppose that ASLR is enabled), and then calculate remote system for spawn a shell.

Simple yet elegent pwn2018-08-17T21:49:18+02:00

My first Arm pwn

2018-08-17T21:48:52+02:00

Recently I have tried for the first time an Arm pwn, a simple program vulnerable to buffer overflow. The only difference between an Arm pwn and a “normal” binary is the assembly code, but look this for see how exploit it.

My first Arm pwn2018-08-17T21:48:52+02:00