This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
session:08 [2018/07/03 20:01] Razvan Deaconescu |
session:08 [2020/07/19 12:49] (current) |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== | + | ====== |
===== Resources ===== | ===== Resources ===== | ||
- | [[http:// | + | /*[[http:// |
+ | |||
+ | [[https:// | ||
[[http:// | [[http:// | ||
Line 70: | Line 72: | ||
===== 4. Challenge: Shellcode as Argument ===== | ===== 4. Challenge: Shellcode as Argument ===== | ||
- | Go to '' | + | Go to '' |
Feed the '' | Feed the '' | ||
Line 224: | Line 226: | ||
<note important> | <note important> | ||
- | This didn't work for us. It may be because of x86_64 varying | + | To reenable ASLR, simply exit the shell you created using '' |
+ | </ | ||
+ | |||
+ | ===== 16. Challenge: io.netgarage.io level05 ===== | ||
+ | |||
+ | Go to the '' | ||
+ | |||
+ | It's a buffer overflow that may end up calling a shellcode placed on the stack buffer. | ||
+ | |||
+ | Create a '' | ||
+ | |||
+ | <note tip> | ||
+ | Use the '' | ||
</ | </ | ||
<note important> | <note important> | ||
- | To reenable | + | Disable |
</ | </ | ||
+ | |||
+ | ===== 17. Challenge: Shellcode on Stack ===== | ||
+ | |||
+ | Go to the '' | ||
+ | |||
+ | Update the '' | ||
+ | |||
+ | ===== 18. Challenge: Shellcode on Stack (32 bit) ===== | ||
+ | |||
+ | Go to the '' | ||
+ | |||
+ | It's similar to the challenge above, except that it runs on 32 bits. Copy and update the '' | ||
/* | /* |