Linux Exploit Development - Level 0
Linux Exploit Development - ctf
| Name |
Level, Description, Solution |
| Tokyo Westerns/MMA CTF 2nd 2016: greeting |
Baby, Format String + Overwrite GOT and .fini_array section, Video, Exploit |
| DEF CON CTF Qualifier 2016: xkcd |
Baby, Heartbleed, Video, Exploit |
| DEF CON CTF Qualifier 2015: babyecho |
Baby, Format string + leak memory address + bypass ASLR, Exploit |
| CSAW CTF Qualification Round 2013: Exploitation 200 |
Baby, Shellcode + leak self-implementation canary, Exploit |
| EBCTF 2013: PWN 200 Brainfuck |
Baby, ++ pointer + Underflow to get system function, Exploit |
| X-MAS CTF 2019: Sn0wverfl0w |
Easy, ret2libc with leak, Binary |
Windows Exploit Development - Exercises from CLS Exploits
| Name |
Level, Description, Solution |
| Level 1b |
Baby, Buffer Overflow overwriting random value with bypass jl condition, Solve |
| Level 2 |
Baby, Buffer Overflow overwriting a cte value and bypass check because of strcpy, Solve |
| Level 3 |
Baby, Buffer Overflow overwriting a cte value and bypass check because of strcpy (Part 2), Solve |
| Level 4 |
Baby, Bypass check with strcpy and overflow, Solve |
| Level 5 |
Baby, Heap allocation and bypass Anti-Debugging, Solve |
| Level 6 |
Baby, Overflow for using strcat string concatenate + flag decision, Solve |
| Level 7 |
Baby, Overwrite RET with memory address to win |