Leet Test [easy]: HackTheBox Pwn Challenge (format string write exploit with pwntools)
Video walkthrough for retired HackTheBox (HTB) Pwn (binary exploitation) challenge "Leet Test" [easy]: "Are you 1337 enough?" - Hope you enjoy 🙂
Sign up for HackTheBox: https://hacktheboxltd.sjv.io/xk75Yk
↢Social Media↣
Twitter: https://twitter.com/_CryptoCat
GitHub: https://github.com/Crypto-Cat
HackTheBox: https://app.hackthebox.eu/profile/11897
LinkedIn: https://www.linkedin.com/in/cryptocat
Reddit: https://www.reddit.com/user/_CryptoCat23
YouTube: https://www.youtube.com/CryptoCat23
Twitch: https://www.twitch.tv/cryptocat23
↢HackTheBox↣
https://app.hackthebox.eu/challenges/173
↢Resources↣
https://github.com/Gallopsled/pwntools-tutorial
https://guyinatuxedo.github.io/
https://wapiflapi.github.io/2019/10/10/efficiency-reverse-engineering-with-ghidra.html
https://www.tutorialspoint.com/format-specifiers-in-c
https://medium.com/swlh/binary-exploitation-format-string-vulnerabilities-70edd501c5be
https://nickcano.com/pwnables-fsb/
https://www.nullhardware.com/reference/hacking-101/picoctf-2018-binary-exploits/echooo/
https://github.com/VulnHub/ctf-writeups/blob/master/2016/angstrom-ctf/format-1.md
https://cotonne.github.io/binary/2020/07/14/format-string.html
https://bitvijays.github.io/LFC-BinaryExploitation.html#format-string-vulnerability
https://www.youtube.com/watch?v=0WvrSfcdq1I
https://www.youtube.com/watch?v=df5P5DiBLng
↢Chapters↣
Start - 0:00
Basic file checks - 0:25
Analyse with Ghidra - 2:57
Format string vulnerability explained - 10:34
Fuzzing format string specifiers - 17:22
Writing to memory using printf - 28:04
Check out PwnTools FmtStr (auto) - 31:25
Calculate random value offset from leaked stack value - 37:46
Perform the writes with FmtStr - 48:55
Build payload manually in PwnTools - 55:42
Test exploit remotely - 58:46
Видео Leet Test [easy]: HackTheBox Pwn Challenge (format string write exploit with pwntools) канала CryptoCat
Sign up for HackTheBox: https://hacktheboxltd.sjv.io/xk75Yk
↢Social Media↣
Twitter: https://twitter.com/_CryptoCat
GitHub: https://github.com/Crypto-Cat
HackTheBox: https://app.hackthebox.eu/profile/11897
LinkedIn: https://www.linkedin.com/in/cryptocat
Reddit: https://www.reddit.com/user/_CryptoCat23
YouTube: https://www.youtube.com/CryptoCat23
Twitch: https://www.twitch.tv/cryptocat23
↢HackTheBox↣
https://app.hackthebox.eu/challenges/173
↢Resources↣
https://github.com/Gallopsled/pwntools-tutorial
https://guyinatuxedo.github.io/
https://wapiflapi.github.io/2019/10/10/efficiency-reverse-engineering-with-ghidra.html
https://www.tutorialspoint.com/format-specifiers-in-c
https://medium.com/swlh/binary-exploitation-format-string-vulnerabilities-70edd501c5be
https://nickcano.com/pwnables-fsb/
https://www.nullhardware.com/reference/hacking-101/picoctf-2018-binary-exploits/echooo/
https://github.com/VulnHub/ctf-writeups/blob/master/2016/angstrom-ctf/format-1.md
https://cotonne.github.io/binary/2020/07/14/format-string.html
https://bitvijays.github.io/LFC-BinaryExploitation.html#format-string-vulnerability
https://www.youtube.com/watch?v=0WvrSfcdq1I
https://www.youtube.com/watch?v=df5P5DiBLng
↢Chapters↣
Start - 0:00
Basic file checks - 0:25
Analyse with Ghidra - 2:57
Format string vulnerability explained - 10:34
Fuzzing format string specifiers - 17:22
Writing to memory using printf - 28:04
Check out PwnTools FmtStr (auto) - 31:25
Calculate random value offset from leaked stack value - 37:46
Perform the writes with FmtStr - 48:55
Build payload manually in PwnTools - 55:42
Test exploit remotely - 58:46
Видео Leet Test [easy]: HackTheBox Pwn Challenge (format string write exploit with pwntools) канала CryptoCat
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Decoding, Brute-Forcing and Crafting Flask Session Cookies - "web-intro" [DefCamp CTF 2022]](https://i.ytimg.com/vi/dA28abgc57o/default.jpg)
![Bat Computer [easy]: HackTheBox Pwn Challenge (shellcode injection)](https://i.ytimg.com/vi/NZfqLFuffYY/default.jpg)
![Day 4 - HTB Cyber Santa CTF: HackTheBox Capture The Flag 2021](https://i.ytimg.com/vi/JJD45W-C9mQ/default.jpg)
![Emdee Five for Life [easy]: HackTheBox Misc Challenge (BeautifulSoup / Burp Intruder)](https://i.ytimg.com/vi/n0Dg-19DB9Y/default.jpg)
![Buffer Overflow (ret2win) with 5 char* Arguments - "Vader" Pwn Challenge [Space Heroes CTF 2022]](https://i.ytimg.com/vi/DRgpQvraTUo/default.jpg)
![fs0ciety [easy]: HackTheBox Misc Challenge (ZIP cracking)](https://i.ytimg.com/vi/-cc1k6AwsLE/default.jpg)
![BitsNBytes [hard]: HackTheBox Stego Challenge (Stego Helper Identification Tool)](https://i.ytimg.com/vi/sI7dQaEp-mE/default.jpg)
![Eat the Cake! [medium]: HackTheBox Reversing Challenge (UPX packing)](https://i.ytimg.com/vi/-x4MZXtnUt4/default.jpg)
![Forensics Challenges - HTB x Synack RedTeamFive Capture The Flag (CTF) 2021](https://i.ytimg.com/vi/uMRWia992IQ/default.jpg)
![Marshal In The Middle [medium]: HackTheBox Forensics Challenge (decrypt TLS traffic in wireshark)](https://i.ytimg.com/vi/6WYN66mygaA/default.jpg)
![Blue Shadow [medium]: HackTheBox Forensics Challenge (tweetlord)](https://i.ytimg.com/vi/8CawjASJi0Q/default.jpg)
![Pwn: clutter-overflow - picoMini CTF 2021 Challenge](https://i.ytimg.com/vi/s5f7vA8AS7U/default.jpg)
![NahamCon CTF 2022: Web Challenge Walkthroughs](https://i.ytimg.com/vi/ttsFRYkL8wQ/default.jpg)
![Pusheen Loves Graphs [easy]: HackTheBox Misc Challenge (IDA Pro)](https://i.ytimg.com/vi/z6kvBBxlSgc/default.jpg)
![Forget Me Not [medium]: HackTheBox Forensics Challenge (volatiliy .dwarf files)](https://i.ytimg.com/vi/GJSALoiVHko/default.jpg)
![JWT Key Confusion & Nunjucks SSTI - "Naughty or Nice" [Day 5: HackTheBox Cyber Santa CTF]](https://i.ytimg.com/vi/tV7C6HSrtm4/default.jpg)
![Manager [easy]: HackTheBox Mobile Challenge (APK Reversing / Traffic Analysis)](https://i.ytimg.com/vi/h6Lirx6mvUA/default.jpg)
![Overwriting RBP with an Off-by-One Buffer Overflow - Cake - [Intigriti 1337UP LIVE CTF 2022]](https://i.ytimg.com/vi/jU7yB-elFV8/default.jpg)
![0 - ROP Emporium Series - Intro/Setup](https://i.ytimg.com/vi/oBZy0bGNezo/default.jpg)
![JSON Web Token Flaws - Python AppSec (by Duo Sec) - Veracode Security Labs Community Edition (free)](https://i.ytimg.com/vi/kZMjX5weIug/default.jpg)