그러니까 PWN
close
프로필 배경
프로필 로고

그러니까 PWN

  • 분류 전체보기 (83)
    • CTF (1)
    • Wargame (17)
      • Dreamhack (14)
      • pwnable.kr (3)
    • Computer Science (15)
      • Computer Architecture (1)
      • Operating System (7)
      • Computation (1)
      • AI (2)
      • Network (4)
    • Computer Security (27)
      • System Hacking (10)
      • Side Channel Attack (7)
      • IoT Security (1)
      • Industrial Security (3)
      • Vulnerabilities (5)
      • Digital Forensic (1)
    • Coding (5)
      • Algorithm (0)
      • Rust (4)
    • 후기 (3)
    • etc (14)
      • trouble shooting (4)
      • pruning (7)
  • 홈
  • 태그
  • 방명록
  • Github

[Pwnable] randerer

We keep a secret

  • format_list_bulleted Wargame/Dreamhack
  • · 2024. 11. 6.

[Pwnable] dowell

We keep a secret

  • format_list_bulleted Wargame/Dreamhack
  • · 2024. 11. 6.
[Pwnable] horcruxes

[Pwnable] horcruxes

포너블 바이너리 공짜 다운로드 ->scp -P 2222 horcruxes@pwnable.kr:/home/horcruxes/horcruxes ./Analysisflag 획득 방법 : ropme() 함수에서 입력하는 숫자와 sum 변수의 값이 일치하면 flag가 출력됨. main()각종 보호기법 추가 및 세팅 더보기int __cdecl main(int argc, const char **argv, const char **envp){ int v4; // [esp+Ch] [ebp-Ch] setvbuf(stdout, 0, 2, 0); setvbuf(stdin, 0, 2, 0); alarm(0x3Cu); hint(); init_ABCDEFG(); v4 = seccomp_init(0); seccomp_r..

  • format_list_bulleted Wargame/pwnable.kr
  • · 2024. 8. 11.
  • textsms
[Pwnable] unlink 시각화하면서 천천히 풀기

[Pwnable] unlink 시각화하면서 천천히 풀기

pwnkr에서는 gdb-peda 사용을 생활화$ gdb -q unlink(gdb) source /usr/share/peda/peda.py > ssh unlink@pwnable.kr -p2222 (pw: guest)Analysis코드 전체보기더보기#include #include #include typedef struct tagOBJ{ struct tagOBJ* fd; struct tagOBJ* bk; char buf[8];}OBJ;void shell(){ system("/bin/sh");}void unlink(OBJ* P){ OBJ* BK; OBJ* FD; BK=P->bk; FD=P->fd; F..

  • format_list_bulleted Wargame/pwnable.kr
  • · 2024. 8. 9.
  • textsms

[Pwnable] rop

We keep a secret

  • format_list_bulleted Wargame/Dreamhack
  • · 2024. 7. 10.

[Pwnable] rot-253

We keep a secret

  • format_list_bulleted Wargame/Dreamhack
  • · 2024. 7. 7.
  • navigate_before
  • 1
  • 2
  • 3
  • navigate_next
:)
  • $ pwd; whoami
Category
  • 분류 전체보기 (83)
    • CTF (1)
    • Wargame (17)
      • Dreamhack (14)
      • pwnable.kr (3)
    • Computer Science (15)
      • Computer Architecture (1)
      • Operating System (7)
      • Computation (1)
      • AI (2)
      • Network (4)
    • Computer Security (27)
      • System Hacking (10)
      • Side Channel Attack (7)
      • IoT Security (1)
      • Industrial Security (3)
      • Vulnerabilities (5)
      • Digital Forensic (1)
    • Coding (5)
      • Algorithm (0)
      • Rust (4)
    • 후기 (3)
    • etc (14)
      • trouble shooting (4)
      • pruning (7)
Recent post
someones' choice
Recent comments
Tags
  • #Reversing
  • #SCA
  • #web
  • #linear cryptanalysis
  • #Pwnable
  • #Network
  • #ctf
  • #CPA
Total Visitor
Today
Yesterday
ALL
Copyright © 쭈미로운 생활 All rights reserved.
Designed by JJuum

티스토리툴바