session:08
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| session:08 [2018/07/03 17:01] – Razvan Deaconescu | session:08 [2020/07/19 09:49] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ====== | + | ====== |
| ===== Resources ===== | ===== Resources ===== | ||
| - | [[http:// | + | /*[[http:// |
| + | |||
| + | [[https:// | ||
| [[http:// | [[http:// | ||
| Line 70: | Line 72: | ||
| ===== 4. Challenge: Shellcode as Argument ===== | ===== 4. Challenge: Shellcode as Argument ===== | ||
| - | Go to '' | + | Go to '' |
| Feed the '' | Feed the '' | ||
| Line 224: | Line 226: | ||
| <note important> | <note important> | ||
| - | This didn't work for us. It may be because of x86_64 varying | + | To reenable ASLR, simply exit the shell you created using '' |
| + | </ | ||
| + | |||
| + | ===== 16. Challenge: io.netgarage.io level05 ===== | ||
| + | |||
| + | Go to the '' | ||
| + | |||
| + | It's a buffer overflow that may end up calling a shellcode placed on the stack buffer. | ||
| + | |||
| + | Create a '' | ||
| + | |||
| + | <note tip> | ||
| + | Use the '' | ||
| </ | </ | ||
| <note important> | <note important> | ||
| - | To reenable | + | Disable |
| </ | </ | ||
| + | |||
| + | ===== 17. Challenge: Shellcode on Stack ===== | ||
| + | |||
| + | Go to the '' | ||
| + | |||
| + | Update the '' | ||
| + | |||
| + | ===== 18. Challenge: Shellcode on Stack (32 bit) ===== | ||
| + | |||
| + | Go to the '' | ||
| + | |||
| + | It's similar to the challenge above, except that it runs on 32 bits. Copy and update the '' | ||
| /* | /* | ||
session/08.1530637266.txt.gz · Last modified: by Razvan Deaconescu
