This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
session:06 [2019/07/13 15:30] Radu-Nicolae NICOLAU (78289) |
session:06 [2020/07/19 12:49] (current) |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | = 0x06. Buffer | + | ====== 0x05. Buffer |
- | == Resources | + | ===== Resources |
- | [[https:// | + | [[https:// |
[[https:// | [[https:// | ||
Line 9: | Line 9: | ||
[[https:// | [[https:// | ||
- | [[https:// | + | /*[[https:// |
- | == Tutorials | + | ===== Tutorials |
- | == Buffers | + | ===== Buffers |
A buffer is an area of contiguous data in memory, determined by a starting address, contents and length. Understanding how buffers are used (or misused) is vital for both offensive and defensive purposes. | A buffer is an area of contiguous data in memory, determined by a starting address, contents and length. Understanding how buffers are used (or misused) is vital for both offensive and defensive purposes. | ||
Line 218: | Line 218: | ||
Can you guess how the resulting code will look like, disassembled? | Can you guess how the resulting code will look like, disassembled? | ||
- | === Stack buffer overflows | + | ==== Stack buffer overflows |
As we have seen in previous sessions, the stack serves multiple purposes: | As we have seen in previous sessions, the stack serves multiple purposes: | ||
Line 408: | Line 408: | ||
</ | </ | ||
- | === Diverting code execution | + | ==== Diverting code execution |
We attempted to use the wonderful '' | We attempted to use the wonderful '' | ||
Line 551: | Line 551: | ||
</ | </ | ||
- | === Overwriting the stored return address | + | ==== Overwriting the stored return address |
Let's wrap up our stack smashing adventure by changing the code flow through overwriting the return address stored on the stack. | Let's wrap up our stack smashing adventure by changing the code flow through overwriting the return address stored on the stack. | ||
Line 709: | Line 709: | ||
</ | </ | ||
- | == Challenges | + | ===== Challenges |
<note important> | <note important> | ||
Line 728: | Line 728: | ||
Use the following [[http:// | Use the following [[http:// | ||
- | === 01. Parrot | + | ==== 01. Parrot |
Some programs feature a "stack smashing protection" | Some programs feature a "stack smashing protection" | ||
Line 750: | Line 750: | ||
</ | </ | ||
- | === 02. Indexing | + | ==== 02. Indexing |
More complex programs require some form of protocol or user interaction. This is where the great [[https:// | More complex programs require some form of protocol or user interaction. This is where the great [[https:// | ||
Line 782: | Line 782: | ||
That is, you will trace the program being exploited and see '' | That is, you will trace the program being exploited and see '' | ||
</ | </ | ||
- | === 03. Smashthestack Level7 | + | ==== 03. Smashthestack Level7 |
Now you can tackle a real challenge. See if you can figure out how you can get a shell from this one. | Now you can tackle a real challenge. See if you can figure out how you can get a shell from this one. | ||
Line 803: | Line 803: | ||
</ | </ | ||
</ | </ | ||
- | === 04. Neighbourly | + | ==== 04. Neighbourly |
Let's overwrite a structure' | Let's overwrite a structure' | ||
Line 810: | Line 810: | ||
The '' | The '' | ||
</ | </ | ||
- | === 05. Bonus: Birds | ||
- | Time for a more complex challenge. Be patient and don't speed through it. | + | ==== 05. Uninitialized |
- | + | ||
- | === 06. Uninitialized | + | |
There' | There' | ||
Line 821: | Line 818: | ||
Do **not** use pwntools for this task. | Do **not** use pwntools for this task. | ||
</ | </ | ||
- | === 07: Bonus: Uninitialized 2 | + | ==== 06: Bonus: Uninitialized 2 ==== |
There' | There' | ||
<note tip> | <note tip> | ||
- | Use '' | + | Use '' |
</ | </ | ||
Line 833: | Line 830: | ||
</ | </ | ||
+ | ==== 05. Bonus: Birds ==== | ||
+ | |||
+ | Time for a more complex challenge. Be patient and don't speed through it. |