
exploit
jchalex
善待人,严做事,无节操
展开
-
pwnable.kr - fd
题目: 题目链接:http://pwnable.kr/play.php ——> 连接登录:ssh fd@pwnable.kr -p2222查看文件及权限:ls -al看到flag文件,但是当前用户fd并没有读权限。 查看fd.ccat fd.c目标:执行system(“/bin/cat flag”); 则:strcmp(“LETMEWIN\n”, buf) == 0 则:buf =原创 2015-12-19 13:40:45 · 3675 阅读 · 0 评论 -
Protostar Format Write Up
protostar format writeup原创 2017-11-22 21:14:21 · 1123 阅读 · 0 评论 -
Defcon - 2015 - 初赛 - r0pbaby writeup
资源r0pbaby 程序目的getshell思路查看文件类型$ file r0pbabyr0pbaby: ELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, for GNU/Linux 2.6.24, stripped原创 2017-11-05 17:20:32 · 3744 阅读 · 0 评论 -
Protostar Stack Write Up
Protostar Stack0#include #include #include int main(int argc, char **argv){ volatile int modified; char buffer[64]; modified = 0; gets(buffer); if(modified != 0) { printf("you原创 2017-11-08 20:34:47 · 1712 阅读 · 0 评论 -
i春秋 - Exploit-Exercises: Nebula - level06
AboutThe flag06 account credentials came from a legacy unix system. Nebula思路题目提示“legacy unix system”,即可破用户密码。cat /etc/passwd | grep flag06得到 sudo apt install johnvim flag06passflag06:ueqwOCnSGdsuM:9原创 2017-02-25 22:51:16 · 1241 阅读 · 0 评论 -
i春秋 - Exploit-Exercises: Nebula - level05
AboutCheck the flag05 home directory. You are looking for weak directory permissions Nebula官网思路进去看看cd /home/flag05/ll发现一个其他人可执行的.backup目录cd .backup/ll看到其他人可读的backup-19072011.tgz 复制到/tmp解压cp backup-原创 2017-02-25 22:35:39 · 1071 阅读 · 0 评论 -
i春秋 - Exploit-Exercises: Nebula - level04
AboutThis level requires you to read the token file, but the code restricts the files that can be read. Find a way to bypass it :)Source#include <stdlib.h>#include <unistd.h>#include <string.h>#incl原创 2017-02-25 22:22:38 · 1262 阅读 · 0 评论 -
i春秋 - Exploit-Exercises: Nebula - level03
AboutCheck the home directory of flag03 and take note of the files there.There is a crontab that is called every couple of minutes.思路先进flag文件夹看看cd /home/flag03vim writable.sh#!/bin/shfor i in /home/fl原创 2017-02-25 22:13:00 · 2061 阅读 · 0 评论 -
i春秋 - Exploit-Exercises: Nebula - level02
AboutThere is a vulnerability in the below program that allows arbitrary programs to be executed, can you find it?Source code#include <stdlib.h>#include <unistd.h>#include <string.h>#include <sys/ty原创 2017-02-25 21:53:03 · 1248 阅读 · 0 评论 -
i春秋 - Exploit-Exercises: Nebula - level01
AboutThere is a vulnerability in the below program that allows arbitrary programs to be executed, can you find it?To do this level, log in as the level01 account with the password level01. Files for th原创 2017-02-25 21:27:03 · 2606 阅读 · 0 评论 -
i春秋 - Exploit-Exercises: Nebula - level00
AboutThis level requires you to find a Set User ID program that will run as the “flag00” account. You could also find this by carefully looking in top level directories in / for suspicious looking dire原创 2017-02-25 13:17:48 · 2543 阅读 · 3 评论 -
pwnable.kr collision
题目: 题目链接:http://pwnable.kr/play.php ——>连接登录查看源码如下:#include <stdio.h>#include <string.h>unsigned long hashcode = 0x21DD09EC;unsigned long check_password(const char* p){ int* ip = (int*)p;原创 2015-12-25 16:12:14 · 2892 阅读 · 0 评论 -
Protostar Heap Write Up
protostar heap write up原创 2017-12-04 11:14:52 · 1355 阅读 · 1 评论