|
You are here |
chovid99.github.io | ||
| | | | |
www.willsroot.io
|
|
| | | | | Vulnerability Research on Low-Level Systems | |
| | | | |
grazfather.github.io
|
|
| | | | | [AI summary] A detailed walkthrough of a Capture The Flag challenge involving breaking a flawed message authentication code (fmac) implementation that uses AES in ECB mode with rotating keys to exfiltrate a flag. | |
| | | | |
wachter-space.de
|
|
| | | | | This is a writeup of an easy/medium pwn challenge called "Profile" featuring a type confusion, some GOT overwriting, and a funny but unnecessary one gadget exploit for the fun of it. We are given the following files: main.c profile (binary) Dockerfile docker-compose.yml Let's look at main.c and see if we can spot a vulnerability from the provided source code. #include #include #include #include struct person_t { int id; int age; char *name; }; void get_value(const char *msg, void *pval) { printf("%s", ms... | |
| | | | |
www.thexero.co.uk
|
|
| | | Discover the detailed process of exploit development for software vulnerabilities. Learn about common challenges and mitigation techniques in modern Operating Systems. | ||