https://github.com/0xdea/raptor_romhack21
#RomHack21 raptor's party pack.
https://github.com/0xdea/raptor_romhack21
exploits format-string-attack slides solaris vulnerability
Last synced: 7 months ago
JSON representation
#RomHack21 raptor's party pack.
- Host: GitHub
- URL: https://github.com/0xdea/raptor_romhack21
- Owner: 0xdea
- License: mit
- Created: 2021-08-16T14:56:15.000Z (over 4 years ago)
- Default Branch: main
- Last Pushed: 2024-01-04T15:49:54.000Z (about 2 years ago)
- Last Synced: 2025-07-03T07:04:19.632Z (7 months ago)
- Topics: exploits, format-string-attack, slides, solaris, vulnerability
- Language: C
- Homepage: https://www.romhack.io
- Size: 27.3 MB
- Stars: 7
- Watchers: 4
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# raptor_romhack21
[](https://github.com/0xdea/raptor_romhack21)
[](https://github.com/0xdea/raptor_romhack21)
[](https://github.com/0xdea/raptor_romhack21)
[](https://twitter.com/0xdea)
[](https://infosec.exchange/@raptor)
> "Converting a memory corruption into a nice weird machine is quite satisfying."
>
> -- Mark Dowd
This repository contains all materials related to *"My last Solaris talk (not your average keynote)"* presented at #RomHack21 on September 25, 2021.
Related links:
https://youtu.be/Nc9ZLTb2hQ8 (video)
http://phrack.org/issues/70/13.html#article (article)
https://security.humanativaspa.it/my-last-solaris-talk-not-your-average-keynote/ (blog)
## article
* [**Exploiting a Format String Bug in Solaris CDE**](https://github.com/0xdea/raptor_romhack21/blob/main/article/phrack70_13.txt). A Phrack article that expands on my presentation.
## exploits
* [**raptor_dtprintcheckdir_sparc2.c**](https://github.com/0xdea/raptor_romhack21/blob/main/exploits/raptor_dtprintcheckdir_sparc2.c). The Solaris/SPARC format string exploit I dissected during my presentation.
* [**raptor_dtprintcheckdir_sparc.c**](https://github.com/0xdea/raptor_romhack21/blob/main/exploits/raptor_dtprintcheckdir_sparc.c). Another version of the same exploit that targets function activation records.
* [**raptor_dtprintcheckdir_intel2.c**](https://github.com/0xdea/raptor_romhack21/blob/main/exploits/raptor_dtprintcheckdir_intel2.c). Solaris/Intel format string exploit.
* [**raptor_dtprintcheckdir_intel.c**](https://github.com/0xdea/raptor_romhack21/blob/main/exploits/raptor_dtprintcheckdir_intel.c). Solaris/Intel stack-based buffer overflow exploit.
## slides
* [**last.pdf**](https://github.com/0xdea/raptor_romhack21/blob/main/slides/last.pdf). Slide deck presented at #RomHack21 (PDF version).
* [**last.pptx**](https://github.com/0xdea/raptor_romhack21/blob/main/slides/last.pptx). Slide deck presented at #RomHack21 (PowerPoint version).