Skip to content

D1533/pwn-attacks

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

27 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Pwn-Attacks

A set of intentionally vulnerable C programs demonstrating common binary exploitation techniques, along with build scripts and example exploits. The C code is deliberately minimal and straightforward to clearly illustrate each vulnerability. The idea is to make the vulnerable binary as simple as posible to focus on the attack topic.

Format-Strings

  • global-read - Read a global variable using format strings
  • global-write - Write to a global variable address using format strings
  • stack-read - Read a stack variable using format strings
  • stack-write - write to a stack variable address using format strings

Got Overwrite

  • GOT overwrite - Overwrite the puts GOT entry to redirect execution to a win funtion

Ret2Win

  • ret2win with canary - Leak the canary one byte at a time and overwrite the return address to call a win function.
  • ret2win no pie - Overwrite the return address to call a win function.
  • ret2win pie - Leak an address to defeat PIE and overwrite the return address to call a win function.

Ret2Shellcode

  • ret2shellcode - Inject and execute shellcode via a stack-based buffer overflow.

ROP

  • rop - Use Return-Oriented Programming (ROP) gadgets to chain existing code in the binary and achieve arbitrary code execution
  • ret2libc - Use puts(puts.got) to leak libc address and ROP using libc gadgets

Misc

About

Implementations and proofs-of-concepts of binary exploitation attacks

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors