Skip to content

naivenom/exploiting

Repository files navigation

Linux Exploit Development - Level 0

Buffer Overflow & Format String Solution
Protostar - Exploit Exercises Stack1
Protostar - Exploit Exercises Format0
Protostar - Exploit Exercises Stack2
Protostar - Exploit Exercises Format1
Protostar - Exploit Exercises Stack3
Protostar - Exploit Exercises Format2
Protostar - Exploit Exercises Stack4
Protostar - Exploit Exercises Format3
Protostar - Exploit Exercises Stack5
Protostar - Exploit Exercises Format4
Protostar - Exploit Exercises Stack6
CSAW CTF 2015: precision Exploit
Angstrom CTF 2016: overflow2, shellcode Buffer Exploit, Shellcode Exploit
3DS CTF 2016: get_started, not_the_same Get Started Exploit, Not the same Exploit
Pico CTF 2013: format1 Exploit

Linux Exploit Development - ctf

Name Level, Description, Solution
Tokyo Westerns/MMA CTF 2nd 2016: greeting Baby, Format String + Overwrite GOT and .fini_array section, Video, Exploit
DEF CON CTF Qualifier 2016: xkcd Baby, Heartbleed, Video, Exploit
DEF CON CTF Qualifier 2015: babyecho Baby, Format string + leak memory address + bypass ASLR, Exploit
CSAW CTF Qualification Round 2013: Exploitation 200 Baby, Shellcode + leak self-implementation canary, Exploit
EBCTF 2013: PWN 200 Brainfuck Baby, ++ pointer + Underflow to get system function, Exploit
X-MAS CTF 2019: Sn0wverfl0w Easy, ret2libc with leak, Binary

Windows Exploit Development - Exercises from CLS Exploits

Name Level, Description, Solution
Level 1b Baby, Buffer Overflow overwriting random value with bypass jl condition, Solve
Level 2 Baby, Buffer Overflow overwriting a cte value and bypass check because of strcpy, Solve
Level 3 Baby, Buffer Overflow overwriting a cte value and bypass check because of strcpy (Part 2), Solve
Level 4 Baby, Bypass check with strcpy and overflow, Solve
Level 5 Baby, Heap allocation and bypass Anti-Debugging, Solve
Level 6 Baby, Overflow for using strcat string concatenate + flag decision, Solve
Level 7 Baby, Overwrite RET with memory address to win