133 lines
2.9 KiB
Markdown
133 lines
2.9 KiB
Markdown
---
|
|
search:
|
|
exclude: true
|
|
---
|
|
# Binary Exploitation
|
|
|
|

|
|
|
|
##### Below you fill find my binary exploitation learning notes, the easier challenges are at the top, and the further down you go, the more we dig into advanced concepts.
|
|
|
|
[ Template Page ](0/0.md)
|
|
|
|
|
|
|
|
##### Preparing the Tools
|
|
|
|
1. [Installing gdb gef](0/gdb.md)
|
|
2. [Installing py pwntools](0/pwntools.md)
|
|
3. [Installing GHIDRA](0/ghidra.md)
|
|
|
|
|
|
|
|
* |
|
|
* |
|
|
* |
|
|
|
|
|
|
|
|
|
|
|
|
##### 1) Beginner Reversing
|
|
|
|
The basics of reversing with simple to understand examples
|
|
|
|
1. [✅ Strings](1/strings.md)
|
|
2. [✅ Helithumper RE](1/heli.md)
|
|
3. [✅ CSAW 2019 Beleaf](1/beleaf.md)
|
|
|
|
|
|
* | grep strings chmod
|
|
* | ghidra, pointers, scanf, puts, arrays, hexa to ascii
|
|
* | ghidra, pointers, arrays, functions
|
|
|
|
|
|
|
|
|
|
|
|
##### 2) Stack Buffer Overflows
|
|
|
|
These are the most common binary exploits, they are there because of insecure functions that do not set a limit to user input, allowing the user to overwrite other memory registers.
|
|
|
|
1. [✅ CSAW 2018 Quals boi](2/boi.md)
|
|
2. [✅ TAMU 2019 pwn1](2/pwn1.md)
|
|
3. [✅ TW 2017 Just Do It!](2/just.md)
|
|
4. [✅ CSAW 2016 Warmup](2/warm.md)
|
|
5. [✅ CSAW 2018 Get it](2/get.md)
|
|
6. [✅ TUCTF 2017 Vulnchat](2/vuln.md)
|
|
|
|
|
|
|
|
* | gbof variable, db-gef,elf, little endian, ghidra, offsets
|
|
* | bof variable
|
|
* | bof variable
|
|
* | bof callfunction
|
|
* | bof callfunction
|
|
* | bof callfunction
|
|
|
|
|
|
|
|
|
|
|
|
##### Assembly x86_64
|
|
|
|
As i hit the shellcode buffer overflow binary challenges, i realized that i needed assembly skills, so this is a simple introduction to modern intel Assembly for the x86_64 (64bits) architecture. We make use of the [syscalls](https://chromium.googlesource.com/chromiumos/docs/+/HEAD/constants/syscalls.md#x86_64-64_bit) used to communicate with the Linux Kernel:
|
|
|
|
1. [✅ Hello World](asm/1.md)
|
|
2. [✅ Hello World Explained ](asm/2.md)
|
|
3. [✅ Jumps, Calls](asm/3.md)
|
|
4. [✅ User Input](asm/4.md)
|
|
5. [✅ Math Operations](asm/5.md)
|
|
6. [✅ Reading / Writing Files](asm/6.md)
|
|
7. [✅ Spawning a shell](asm/7.md)
|
|
|
|
|
|
|
|
|
|
|
|
##### 2) Stack Buffer Overflows (Part 2)
|
|
|
|
1. [✅ CSAW 2017 Pilot](2/pilot.md)
|
|
2. [✅ Tamu 2019 pwn3](2/pwn3.md)
|
|
3. [✅ Tuctf 2018 shella-easy](2/shella.md)
|
|
4. [✅ BKP 2016 calc](2/calc.md)
|
|
5. [✅ DCQuals 2019 speed](2/speed.md)
|
|
6. [✅ DCQuals 2016 feed](2/feed.md)
|
|
7. [✅ CSAW 2019 babyboi](2/bboi.md)
|
|
8. [✅ CSAW 2017 SVC](2/svc.md)
|
|
9. [✅ FB 2019 Overfloat](2/overf.md)
|
|
10. [✅ hs 2019 storytime](2/hs.md)
|
|
11. [✅ UTC 2019 shellme](2/shme.md)
|
|
|
|
|
|
|
|
* | bof shellcode
|
|
* | bof shellcode
|
|
* | bof shellcode
|
|
* | bof ROP Chain, ROP Gadgets
|
|
* | bof ROP Chain, ROP Gadgets
|
|
* | bof ROP Chain, ROP Gadgets
|
|
* | bof dynamic
|
|
* | bof dynamic
|
|
* | bof dynamic
|
|
* | bof dynamic
|
|
* | bof dynamic
|
|
|
|
|
|
|
|
|
|
|
|
##### 3) Bad Seed
|
|
|
|
1. [✅ h3 time ](3/h3.md)
|
|
2. [✅ hsctf 2019 tux talk ](3/tux.md)
|
|
3. [✅ Sunshine 17 Prepared ](3/prep.md)
|
|
|
|
|
|
|
|
* | time seed
|
|
* | time seed
|
|
* | time seed
|
|
|
|
|
|
|