SimpleAuth
Daniele Scanu2020-04-27T10:20:47+02:00Welcome back on Exploitnetworking. SimpleAuth is a web challenge of TokyoWesterns CTF. The base of this challenge is manipulate the php function parse_str to bypass auth control and get the flag.
Welcome back on Exploitnetworking. SimpleAuth is a web challenge of TokyoWesterns CTF. The base of this challenge is manipulate the php function parse_str to bypass auth control and get the flag.
In this machine there is a nodejs service exploitable in a easy and direct way. And for privilege escalation there is a simple trick with python.
Ron, Adi and Leonard is a funny crypto challenge, based on RSA, in particular in this challenge the exponent e is very big, then the ciphertext is vulnerable to Wiener’s attack.
This challenge was a very simple crypto, there was a file called “ciphertext.txt” with some values in hexadecimal, binary, decimal and octal
Hey guys! Here there is another writeup of a pwn of the HackCon18 ctf. The challenge She Sells Sea Shells was a very easy pwn based on buffer overflow, where you can simply put a shellcode in buffer and jump on it!
Hey guys, it’s just finished the HackCon18 ctf, let’s see the writeup of Simple Yet Elegent pwn. This pwn is based on format string vulnerability and buffer overflow, then our target is leak an address of libc with the format string (because we suppose that ASLR is enabled), and then calculate remote system for spawn a shell.
Recently I have tried for the first time an Arm pwn, a simple program vulnerable to buffer overflow. The only difference between an Arm pwn and a “normal” binary is the assembly code, but look this for see how exploit it.
Welcome back on Exploitnetworking! Today we’ll see a Valentine write up. This box is really funny because the first step is based on heartbleed vulnerability that permit you to exploit openssl protocol and read the machine memory.
Hey guys! Today we are on Hack The Box for see Nibbles writeup. This machine, was been relatively easy compared to other machine. The web part was easy enough and the privilege escalation: “a piece of cake”
Falafel was one of my favorite machines on Hack The Box. Thanks to it I have learn many new tricks for the web part. The privilege escalation part was very exotic!
Questo sito utilizza cookies per migliorare l’esperienza utente.
This site uses functional cookies and external scripts to improve your experience.
Privacy
This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.
NOTE: These settings will only apply to the browser and device you are currently using.
Polylang
Installa un cookies per ricordarsi quale lingua è stata selezionata all'interno del sito.
It installs a cookies to remember what language has been selected inside the site.
Privacy_embeds
Questo plugin necessario memorizza un cookies per mostrare i contenuti della pagina Twitter e Facebook di ExploitNetworking.
This necessary plugin store cookies for of the Twitter and Facebook contents of this blog.
Jetpack
Plugin necessario utilizzato per monitore le attività del visitatore all'interno del sito.
This necessary plugin is used for monitoring activity users by the site.
WP GDPR Compliance
Questo plugin necessario tiene traccia dei cookies accettati o meno.
This necessary plugin store accepted cookies.