While the last lab introduced the subject of Heap Exploitation, this lab focuses on Misc and Stack Cookies.
After we have introduced ASLR and ways to bypass it in the last writeup, we will expand our exploits to the Heap in this lab.
The previous lab focused on the subject of return oriented programming in order to circumvent data execution prevention. The next lab described in this writeup introduces ASLR.
Note: ASLR should be enabled by now.
In the last writeup we used different format string vulnerabilites in order to exploit the provided binaries. This writeup continues with lab05 which introduces DEP and ROP.
In the last lab, which writeup can be found here, we used publicly available shellcodes as well as shellcodes we had to write on our own, in order to exploit the provided binaries. In this writeup we proceed with the next lab, which focuses on the subject of Format Strings.
The last writeup for RPISEC/MBE lab02 dealt with the subject of Memory Corruption. We used different buffer-overflow vulnerabilities to execute a predefined function
shell, which kindly spawned a shell for us. In real life there usually isn’t such a function, we can simply call. Thus we have to inject our own code. Accordingly the next lab described in this writeup brings up the topic of Shellcoding.
In the last writeup for RPISEC/MBE lab01 we used radare2 to reverse three different binaries in order to reveal a secret password or serial. In this writeup we continue with lab02 which broaches the issue of Memory Corruption.
RPISEC is the resident computer security club at Rensselaer Polytechnic Institute. They developed a university course to teach skills in vulnerability research, reverse engineering and binary exploitation. The course material can be found on github including a detailed explanation on how to run the provided VM: https://github.com/RPISEC/MBE.
As every year hacking-lab.com carried out the annual HACKvent challenge. Each day from the 1st of december until the 24th a new challenge is published. The difficulty raises from day to day. After all I managed to solve 20 of 24 tasks:
Day 01: 5th anniversary
Day 02: Wishlist
Day 03: Strange Logcat Entry
Day 04: HoHoHo
Day 05: Only one hint
Day 06: Santa’s journey
Day 07: i know …
Day 08: True 1337s
Day 09: JSONion
Day 10: Just play the game
Day 11: Crypt-o-Math 2.0
Day 12: giftlogistics
Day 13: muffin_asm
Day 14: Happy Cryptmas
Day 15: Unsafe Gallery
Day 16: Try to escape …
Day 17: Portable NotExecutable
Day 18: I want to play a Game (Reloaded)
Day 19: Cryptolocker Ransomware
Day 20: linux malware
Day 21: tamagotchi
Day 22: frozen flag
Day 23: only perl can parse Perl
Day 24: Chatterbox