|
You are here |
unorde.red | ||
| | | | |
tcode2k16.github.io
|
|
| | | | | a random blog about cybersecurity and programming | |
| | | | |
www.jaybosamiya.com
|
|
| | | | | Return Oriented Programming (ROP) is one of the classic exploitation techniques, that is used to bypass the NX (non executable memory) protection. Microsoft has incorporated NX as DEP (data execution prevention). Even Linux etc, have it effective, which means that with this protection, you could no longer place shellcode onto heap/stack and have it execute just by jumping to it. So now, to be able to execute code, you jump into pre-existing code (main binary,... | |
| | | | |
blog.nuculabs.dev
|
|
| | | | | Hello, In this article I present you the solution to nice and short cracking challenge from Root-Me. After opening it up in Ghidra, I saw that the challenge is easy to solve, all you need is to find the password, which is in plain text. Basically just copy paste and you get the flag, but wait, there's a twist! I should have learned my lesson from the other challenge from Root-Me, which also had a twist. | |
| | | | |
lukevanderhart.com
|
|
| | | |||