Protostar x86-64: Stack 4

August 7, 2018, 5:49 pm

So let's look at the vulnerable code:

Source Code

#include 
#include 
#include 
#include 

void win()
{
  printf("code flow successfully changed\n");
}

int main(int argc, char **argv)
{
  char buffer[64];

  gets(buffer);
}

Explanation of the source c

...

Continue Reading...

Protostar x86-64: Stack 3

August 7, 2018, 5:48 pm

So let's look at the vulnerable code:

Source Code

#include 
#include 
#include 
#include 

void win()
{
  printf("code flow successfully changed\n");
}

int main(int argc, char **argv)
{
  volatile int (*fp)();
  char buffer[64];

  fp = 0;

  gets(buffer...

Continue Reading...

Protostar x86-64: Stack 2

August 7, 2018, 5:47 pm

So let's look at the vulnerable code:

Source Code

#include 
#include 
#include 
#include 

int main(int argc, char **argv)
{
  volatile int modified;
  char buffer[64];
  char *variable;

  variable = getenv("GREENIE");

  if(variable == NULL) {
      err...

Continue Reading...

Protostar x86-64: Stack 1

August 7, 2018, 5:46 pm

So let's look at the vulnerable code:

Source Code

#include 
#include 
#include 
#include 

int main(int argc, char **argv)
{
  volatile int modified;
  char buffer[64];

  if(argc == 1) {
      errx(1, "please specify an argument\n");
  }

  modified = 0;...

Continue Reading...

Protostar x86-64: Stack 0

August 7, 2018, 5:45 pm

Introduction

I decided to realize the challenges Exploit-exercice in 64-bit version. Nowadays, there is not much GNU / Linux in 32 bits.
Moreover, except LiveOverflow, I have not seen anyone choose this approach.

For those who do not know, Protostar is a challenge suite designed to learn...

Continue Reading...