Exploit 500 is the final exploitation challenge for CSAW CTF. It looks like a game asking questions. You get 2 tries per question. .text:08048CF7 buffer1 = byte ptr -4B4h .text:08048CF7 buffer2 = byte ptr -438h .text:08048CF7 answer = […]
We have a binary with a format string vulnerability: $ nc localhost 23456 What would be the last word you want say before the Mayan Calender ends? Saying: %p %p %p %p Starting count down to the end of the world! 5 4 3 2 […]
We have an interesting binary that uses signals to call functions. The most interesting handler is the user input handler: (function names are my own, binary was stripped) .text:080488C8 inputHandler proc near ; DATA XREF: sub_8048A3D+2Bo .text:080488C8 .text:080488C8 s […]
In this challenge, we need to get administrator credential on someone’s site who loves cat, ajax and getting contact emails. A robot will visit any link you post in the contact form, this robot is at the same time logged in the site’s administrator account.