Our Scenarios
pwn

Binary Exploitation 102

Info

Binary exploitation is the process of subverting a compiled application such that it violates some trust boundary in a way that is advantageous to you, the attacker.

What you will learn

This tutorial introduces the concept of exploiting a binary file (executable) using a common attack called Off-By-One (Stack Based). After completing, it the participant should have learned: * How to detect a simple off-by-one vulnerability. * How to exploit a simple off-by-one vulnerability.

Scenario pre-requisites

It is recommended to be familiar with the following concepts: * Assembly language * C programming language * Basic linux usage and commands * GDB

  • MODESINGLEPLAYER
  • TYPECCL
  • DIFFICULTYINTERMEDIATE
  • TIME60 MINUTES
  • COST10 CRYSTALS
SHARE