Skip to main content
  1. Categories/

Pwning

2021


2020


2019


ROP - ret2libc attack

·1873 words·9 mins
Today, I will show you how to use Return Oriented Programming for doing a ret2libc attack. Foreword #This is much more harder than what we encountered earlier, unlike before we won’t have any function preloaded with strings like /bin/cat flag.

Introduction to ROP

·617 words·3 mins
This blog post will let you know about the ROP or Return Oriented Programming. What is ROP? #Return Oriented Programming is a modern method of exploiting a binary that will allow us to take control of the stack and the abuse program’s control flow by the help of gadgets.

2018


Binary Exploitation - Format String + Buffer Overflow Vulnerability

·3623 words·18 mins
A detailed guide to use a format string vulnerability to bypass protections and use the buffer overflow vulnerability to get a shell. Foreword #I want to write this post because while I was trying to learn more about binary exploitation, I came across this interesting challenge as this shows how a two way vulnerability would be used to bypass stack canary protection and executable stack and let you use the buffer overflow vulnerability.