Protostar heap2AboutThis level examines what can happen when heap pointers are stale.This level is completed when you see the "you have logged in already!" messageThis level is at /opt/protostar/bin/h
原创 2013-06-19 00:26:04
675阅读
堆是一个很难的部分,为了方便入门,这篇文章只是简单的介绍了一些堆的运作机制,之后的文章再慢慢介绍其他的机制
原创 5月前
0阅读
This level is at /opt/protostar/bin/heap0
原创 2013-04-21 15:21:53
715阅读
Hints:This level is at /opt/protostar/bin/stack1
原创 2013-04-14 01:34:28
556阅读
Hints: objdump -t is your friend, and your input string lies far up the stack :)
原创 2013-04-20 22:45:57
1037阅读
1点赞
1评论
This level is at /opt/protostar/bin/net1<h2 style="margin: 10px 0px; font-family: "Droid Sans', sans-serif; font-weight: normal; line-height: 40px; color: rgb(255, 255, 255); text-rendering: optimi
原创 2013-04-29 13:02:28
317阅读
When you are exploiting this and you don't necessarily know your IP address and port number (proxy, NAT / DNAT, etc), you can determine that the string is properly aligned by seeing if it crashes or n
原创 2013-05-02 16:20:43
2250阅读
Hints:This level is at /opt/protostar/bin/format0
原创 2013-04-20 01:34:00
593阅读
This level is at /opt/protostar/bin/net2<h2 style="margin: 10px 0px; font-family: "Droid Sans', sans-serif; font-weight: normal; line-height: 40px; color: rgb(255, 255, 255); text-rendering: optimi
原创 2013-04-29 13:26:45
393阅读
This level is at /opt/protostar/bin/net3<h2 style="margin: 10px 0px; font-family: "Droid Sans', sans-serif; font-weight: normal; line-height: 40px; color: rgb(255, 255, 255); text-rendering: optimi
原创 2013-04-30 11:37:40
438阅读
二进制安全虚拟机Protostar靶场(8)heap3 Fastbins unlink exploit
原创 5月前
0阅读
This level is at /opt/protostar/bin/stack0
原创 2013-04-11 23:45:25
319阅读
This level is at /opt/protostar/bin/format2
原创 2013-04-20 23:01:28
563阅读
This level is at /opt/protostar/bin/format3
原创 2013-04-23 17:24:31
868阅读
1点赞
1评论
This level is at /opt/protostar/bin/stack2
原创 2013-04-14 01:24:15
623阅读
Hints:This level is at /opt/protostar/bin/stack3
原创 2013-04-14 01:50:12
460阅读
Hints:This level is at /opt/protostar/bin/stack4
原创 2013-04-14 02:20:16
436阅读
Hints:This level is at /opt/protostar/bin/stack5objdump -d shell.o user@protostar:~/stack5$ cat pwn5.py #!/usr/bin/env pythonoffset = 72shellcode = "\xb8\x2f\x73\x68\xf0\x25\xff\xff\xff\x0f\x50\x
原创 2013-04-14 02:52:56
972阅读
This level can be done in a couple of ways, such as finding the duplicate of the payload ( objdump -s will help with this), or ret2libc , or even return orientated programming.Sour
原创 2013-04-16 15:43:14
821阅读
  • 1
  • 2
  • 3
  • 4
  • 5