This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
session:08 [2018/07/03 20:12] Razvan Deaconescu [15. Tutorial: Shellcode on Stack] |
session:08 [2020/07/19 12:49] (current) |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== | + | ====== |
===== Resources ===== | ===== Resources ===== | ||
- | [[http:// | + | /*[[http:// |
+ | |||
+ | [[https:// | ||
[[http:// | [[http:// | ||
Line 70: | Line 72: | ||
===== 4. Challenge: Shellcode as Argument ===== | ===== 4. Challenge: Shellcode as Argument ===== | ||
- | Go to '' | + | Go to '' |
Feed the '' | Feed the '' | ||
Line 222: | Line 224: | ||
In the '' | In the '' | ||
- | |||
- | <note important> | ||
- | This didn't work for us. It may be because of x86_64 varying the addresses even in the absence of ASLR. | ||
- | </ | ||
<note important> | <note important> | ||
Line 247: | Line 245: | ||
</ | </ | ||
+ | ===== 17. Challenge: Shellcode on Stack ===== | ||
+ | |||
+ | Go to the '' | ||
+ | |||
+ | Update the '' | ||
+ | |||
+ | ===== 18. Challenge: Shellcode on Stack (32 bit) ===== | ||
+ | |||
+ | Go to the '' | ||
+ | |||
+ | It's similar to the challenge above, except that it runs on 32 bits. Copy and update the '' | ||
/* | /* |