|
You are here |
cronop-io.github.io | ||
| | | | |
blog.thalium.re
|
|
| | | | | [AI summary] The provided text is a detailed technical analysis of a security vulnerability in the TEEgris secure kernel of a Samsung device, focusing on exploit development and reverse engineering techniques. It outlines the following key points: | |
| | | | |
www.elttam.com
|
|
| | | | | elttam is a globally recognised, independent information security company, renowned for our advanced technical security assessments. | |
| | | | |
tcode2k16.github.io
|
|
| | | | | a random blog about cybersecurity and programming | |
| | | | |
blog.nuculabs.dev
|
|
| | | Hello, In this article I'll present you my solution on the Chapter 5 CTF from the book Practical Binary Analysis. For this binary, the hint is to fix four broken things. Running file gives us the following response: 1 2 binary@binary-VirtualBox:~/ctf$ file ./lvl3 ./lvl3: ERROR: ELF 64-bit LSB executable, Motorola Coldfire, version 1 (Novell Modesto) error reading (Invalid argument) And the readelf command gives us: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 binary@binary-VirtualBox:~/ctf$ readelf -h ./lvl3 ELF Header: Magic: 7f 45 4c 46 02 01 01 0b 00 00 00 00 00 00 00 00 Class: ELF64 Data: 2's complement, little endian Version: 1 (current) OS/ABI: Novell - Modesto ABI Version: 0 Type: EXEC (Executable file) Machine: Motorola Coldfire Version: ... | ||