Binary Exploitation [pwnable.kr] - (Level 6) random
#Challange Description
Name | random |
Points | 1 |
Solves | 9870 times |
Category | Exploitation |
Description | Daddy, teach me how to use random value in programming! |
Binary Exploitation [pwnable.kr] - (Level 6) random
Name | random |
Points | 1 |
Solves | 9870 times |
Category | Exploitation |
Description | Daddy, teach me how to use random value in programming! |
Binary Exploitation [pwnable.kr] - (Level 5) passcode
Name | random |
Points | 10 |
Solves | 7513 times |
Category | Exploitation |
Description | Mommy told me to make a passcode based login system. My initial C code was compiled without any error! Well, there was some compiler warning, but who cares about that? |
Binary Exploitation [pwnable.kr] - (Level 4) flag
Name | flag |
Points | 7 |
Solves | 10695 times |
Category | Exploitation |
Description | Papa brought me a packed present! let’s open it. This is reversing task. all you need is binary |
Binary Exploitation [pwnable.kr] - (Level 3) BOF
Name | BOF |
Points | 7 |
Solves | 12586 times |
Category | Exploitation |
Description | Nana told me that buffer overflow is one of the most common software vulnerability. Is that true? |
Binary Exploitation [pwnable.kr] - (Level 2) Collision
Name | BOF |
Points | 7 |
Solves | 12586 times |
Category | Exploitation |
Description | Daddy told me about cool MD5 hash collision today. I wanna do something like that too! |
Binary Exploitation [pwnable.kr] - (Level 1) FD
Name | FD |
Points | 7 |
Solves | 12586 times |
Category | Exploitation |
Description | Mommy! what is a file descriptor in Linux? |
Linux Binary Exploitation Series (with pwnable.kr)
There’s no use talking about the problem unless you talk about the solution.
This is a kick-off post for the series of post on The War Game pwnable.kr. It’s focused on Linux Exploitation.
Update your browser to view this website correctly.&npsb;Update my browser now