Information security project. This is a collection of ELF Binary exploits to better understand how memory works.
| Level | Ressources | Exploit |
|---|---|---|
| 0 | EAX register | Simple reverse engineering |
| 1 | EIP register | Byte order | cat |
Buffer overflow attack |
| 2 | ret2libc attack | |
| 3 | printf() |
format string attack |
| 4 | format string attack | |
| 5 | format string attack | GOT overwrite | |
| 6 | strcpy() |
Buffer overflow attack |
| 7 | Buffer overflow attack | GOT overwrite | |
| 8 | Simple reverse engineering | |
| 9 | Buffer overflow attack | |
| bonus0 | shell-storm | exploit-db | Shellcode injection |
| bonus1 | Integer underflow | Buffer overflow attack | |
| bonus2 | Shellcode injection | |
| bonus3 | Simple reverse engineering |