|
You are here |
tcode2k16.github.io | ||
| | | | |
www.da.vidbuchanan.co.uk
|
|
| | | | | ||
| | | | |
karmanyaah.malhotra.cc
|
|
| | | | | [AI summary] The user provided a detailed write-up of their experience solving various pwn challenges in the bcactf 2022 competition. They described the techniques used for each challenge, including format string exploits, ROP chains, and libc leak methods. The write-up also mentions the final score and the team's placement in the high school division. | |
| | | | |
wachter-space.de
|
|
| | | | | This is a writeup of an easy/medium pwn challenge called "Profile" featuring a type confusion, some GOT overwriting, and a funny but unnecessary one gadget exploit for the fun of it. We are given the following files: main.c profile (binary) Dockerfile docker-compose.yml Let's look at main.c and see if we can spot a vulnerability from the provided source code. #include #include #include #include struct person_t { int id; int age; char *name; }; void get_value(const char *msg, void *pval) { printf("%s", ms... | |
| | | | |
jrhawley.ca
|
|
| | | This post is a walkthrough of how to get these Linux GUI applications running on Windows using the Windows Subsystem for Linux. | ||