Skip to main content

Posts

Showing posts from April, 2018

Binary Exploitation Protostar Stack6 - Walkthrough - Return To Libc - Writeup

Hello Guyz,



Welcome again to my blog. Today, I am going to share with you my walkthrough experience of Exploit-Exercise Protostar Stack6 Level.

In this level, Our goal is to overwrite Return pointer Address And Then Use This Vulnerability To Execute Our Injected Shellcodes. Actually, We just have to prove that with this vulnerability we can exploit this software. but here comes another difficulty of this level. As Already mentioned in hint

Stack6 looks at what happens when you have restrictions on the return address. So, In simple words, we have to exploit this level with another technique.

After Searching About Different Concepts And Techniques. I found some techniques that can bypass this level restrictions easily.

and I will also suggest you to spend few minutes in reading about these techniques.

1. Return To Libc
2. Duplicate Code Execution
3. Return To Text Execution
4. Return To Object Orient Programming

And Try To Apply all these techniques at this level.
By The way, I am goin…

Binary Exploitation Protostar Stack6 - Walkthrough - Using Duplicate Code Execution - writeup

Hello Guyz,



Welcome again to my blog. Today, I am going to share with you my walkthrough experience of Exploit-Exercise Protostar Stack6 Level.


In this level, Our goal is to overwrite Return pointer Address And Then Use This Vulnerability To Execute Our Injected Shellcodes. Actually, We just have to prove that with this vulnerability we can exploit this software. but here comes another difficulty of this level. As Already mentioned in the hint

Stack6 looks at what happens when you have restrictions on the return address. So, In simple words, we have to exploit this level with another technique.

After Searching, Different Concepts And Techniques. I found some techniques that can bypass this level restrictions easily.
and I will also suggest you to spend few minutes in reading about these techniques.

1. Return To Libc
2. Duplicate Code Execution
3. Return To Text Execution
4. Return To Object Orient Programming

And Try To Apply all these techniques at this level.
By The way, I am going…

Binary Exploitation Protostar Stack6 - Walkthrough - Using Return To Text Execution - Writeup

Hello Guyz,



Welcome again to my blog. Today, I am going to share with you my walkthrough experience of Exploit-Exercise Protostar Stack6 Level.

In this level, Our goal is to overwrite Return pointer Address And Then Use This Vulnerability To Execute Our Injected Shellcodes. Actually, We just have to prove that with this vulnerability we can exploit this software. but here comes another difficulty of this level. As Already mentioned in hint

Stack6 looks at what happens when you have restrictions on the return address. So, In simple words, we have to exploit this level with another technique.

After Searching, Different Concepts And Techniques. I found some techniques that can bypass this level restrictions easily.

and I will also suggest you to spend few minutes in reading about these techniques.

1. Return To Libc
2. Duplicate Code Execution
3. Return To Text Execution
4. Return To Object Orient Programming

And Try To Apply all these techniques at this level.
By The way, I am going to …

Binary Exploitation Protostar Stack6 - Walkthrough - Using EGG Shell Method - Writeup

Hello Guyz,



Welcome again to my blog. Today, I am going to share with you my walkthrough experience of Exploit-Exercise Protostar Stack6 Level.
In this level, Our goal is to overwrite Return pointer Address And Then Use This Vulnerability To Execute Our Injected Shellcodes. Actually, We just have to prove that with this vulnerability we can exploit this software. but here comes another difficulty of this level. As Already mentioned in hint Stack6 looks at what happens when you have restrictions on the return address. So, In simple words, we have to exploit this level with another technique.

After Searching About Different Concepts And Techniques. I found some techniques that can bypass this level restrictions easily.
and I will also suggest you to spend few minutes in reading about these techniques.

1. Return To Libc
2. Duplicate Code Execution
3. Return To Text Execution
4. Return To Object Orient Programming

And Try To Apply all these techniques at this level.
By The way, I am goin…

Binary Exploitation Protostar Stack5 - Walkthrough - Writeup

Hello Guyz,



Welcome again to my blog. Today, I am going to share with you my walkthrough experience of Exploit-Exercise Protostar Stack5 Level.
In this level, Our goal is to overwrite Return pointer Address Onto The Stack, So that Instead Of Returning To Main libc function, EIP (Instruction Pointer) will Point To Our Injected Shellcode. Actually Here, At this level, We just need to demonstrate that how we can use return pointer overwrite vulnerability to execute our Injected Shellcode Or Any Opcode.
Here, Opcode refers to Machine Operation Codes.

Shellcode :

Basically, Shellcodes is just a word to represent any small piece of Machine Operation Codes That can open a shell. In Other Words, It refers to the piece of Machine Operation Codes that can do any specific task.

For More Information, I will suggest you to Use Google.


Before Starting Our Walkthrough Let's Take a Look At Hints And Details.
Note: I want to highlight Few Points. I'm not the creator of protostar war game. I am j…

Binary Exploitation Protostar Stack4 - Walkthrough - writeup

Hello Guyz,



Welcome again to my blog. Today, I am going to share with you my walkthrough experience of Exploit-Exercise Protostar Stack4 Level.
In this level, Our goal is to overwrite Return pointer Address Onto The Stack, So that Instead Of Returning To Our main function, EIP (Instruction Pointer) will Return To Our Specific Function. Actually, Here We Have To Point Our Return Pointer To WIN function that is already Given In Program.

Before Starting Our Walkthrough Let's Take a Look At Hints And Details.
Note: I want to highlight Few Points. I'm not the creator of protostar war game. I am just a player.Here, I am Just providing you hints and reference so, that if you feel stuck anywhere. Take a Look Here.Understand all previous levels before starting this one.Do some research on Assembly, C/C++ and Gdb
Source Codes#include <stdlib.h> #include <unistd.h> #include <stdio.h> #include <string.h> void win() { printf("code flow successfully changed\n&…

Binary Exploitation Protostar Stack3 - Walkthrough - Writeup

Hello Guyz,



Today, In this post I am going to share with you, walkthrough process to win Protostar stack3 level.
But before starting this walkthrough, Some Pre-requested Points

Before Starting This Walkthrough. I want to highlight Few Points. I'm not the creator of protostar war game. I am just a player.Here, I am Just providing you hints and reference so, that if you feel stuck anywhere. Take a Look Here.Understand all previous levels before starting this one.Do some research on Assembly, C/C++ and Gdb
Source Code#include <stdlib.h>#include <unistd.h>#include <stdio.h>#include <string.h>voidwin() { printf("code flow successfully changed\n"); } intmain(int argc, char**argv) { volatileint (*fp)(); char buffer[64]; fp =0; gets(buffer); if(fp) { printf("calling function pointer, jumping to 0x%08x\n", fp); fp(); } } Hints Provided By Exploit-Exercise
Stack3 looks at environment variables, and how they can be set…

Binary Exploitation Protostar Stack2 - Walkthrough - Writeup

Hello Guyz,




In This Post, I am going to show you how we can win protostar stack2 level and in today's tutorial, our main focus will be on variable overwriting and environment variable manipulation. In This Challenge, we are going to learn how we can use environment variables as a bridge to Stack so that we can overwrite the values of any variable Onto Stack during running state.

Before Starting This Walkthrough. I want to highlight Few Points. I'm not the creator of protostar war game. I am just a player.Here, I am Just providing you hints and reference so, that if you feel stuck anywhere. Take a Look Here.

Source Code : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28#include <stdlib.h>#include <unistd.h>#include <stdio.h>#include <string.h>intmain(int argc, char**argv) { volatileint modified; char buffer[64]; char*variable; variable = getenv("GREENIE"); if(variable ==NULL) { errx(1, "p…

Binary Exploitation Protostar Stack1 - Walkthrough -Writeup

Hello Guyz,




In This Post, I am going to show you how we can win protostar stack1 level and in today's tutorial, our main focus will be on variable overwriting. we are going to learn a simple concept/technique that can overwrite the values of any variable Onto Stack during running state.

Before Starting This Walkthrough. I want to highlight Few Points. I'm not the creator of protostar war game. I am just a player.Here, I am Just providing you hints and reference so, that if you feel stuck anywhere. Take a Look Here.

Source Code : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23#include <stdlib.h>#include <unistd.h>#include <stdio.h>#include <string.h>intmain(int argc, char**argv) { volatileint modified; char buffer[64]; if(argc ==1) { errx(1, "please specify an argument\n"); } modified =0; strcpy(buffer, argv[1]); if(modified ==0x61626364) { printf("you have correctly got the variable to the …

Related Post