Linux Exploit Development - ctf
| Name | Level, Description, Solution |
|---|---|
| Tokyo Westerns/MMA CTF 2nd 2016: greeting | Baby, Format String + Overwrite GOT and .fini_array section, Video, Exploit |
| DEF CON CTF Qualifier 2016: xkcd | Baby, Heartbleed, Video, Exploit |
| DEF CON CTF Qualifier 2015: babyecho | Baby, Format string + leak memory address + bypass ASLR, Exploit |
| CSAW CTF Qualification Round 2013: Exploitation 200 | Baby, Shellcode + leak self-implementation canary, Exploit |
| EBCTF 2013: PWN 200 Brainfuck | Baby, ++ pointer + Underflow to get system function, Exploit |
| X-MAS CTF 2019: Sn0wverfl0w | Easy, ret2libc with leak, Binary |
Windows Exploit Development - Exercises from CLS Exploits
| Name | Level, Description, Solution |
|---|---|
| Level 1b | Baby, Buffer Overflow overwriting random value with bypass jl condition, Solve |
| Level 2 | Baby, Buffer Overflow overwriting a cte value and bypass check because of strcpy, Solve |
| Level 3 | Baby, Buffer Overflow overwriting a cte value and bypass check because of strcpy (Part 2), Solve |
| Level 4 | Baby, Bypass check with strcpy and overflow, Solve |
| Level 5 | Baby, Heap allocation and bypass Anti-Debugging, Solve |
| Level 6 | Baby, Overflow for using strcat string concatenate + flag decision, Solve |
| Level 7 | Baby, Overwrite RET with memory address to win |