poniedziałek, 23 maja 2016

Smash The Tux 1.0.1 CTF Writeup - 0x00

First stage of SmashTheTux CTF. Thanks 1ce7ea and Vulnhub!

Let's install VM and start the first challenge:

Check README and the whole $HOME directory:

Good. Let's check now 0x00 challenge:

Ok, so it looks like a standard overflow (randomize is set to 0, so it should be easier):

So we've got a crash (remember strcpy? Let's find a shellcode to try here:

Thanks ShellStorm ;) Running again to get the RET:

Ok, retest:

No we see our 'A'-shellcode:

Retest with new values and real shellcode:

So, 0x00 is done. :)

If you want more, definitely check g0blin's writeup. Excellent job man. Thanks!

Brak komentarzy:

Prześlij komentarz