An open API service indexing awesome lists of open source software.

https://github.com/0xdea/raptor_romhack21

#RomHack21 raptor's party pack.
https://github.com/0xdea/raptor_romhack21

exploits format-string-attack slides solaris vulnerability

Last synced: 7 months ago
JSON representation

#RomHack21 raptor's party pack.

Awesome Lists containing this project

README

          

# raptor_romhack21
[![](https://img.shields.io/github/stars/0xdea/raptor_romhack21.svg?style=flat&color=yellow)](https://github.com/0xdea/raptor_romhack21)
[![](https://img.shields.io/github/forks/0xdea/raptor_romhack21.svg?style=flat&color=green)](https://github.com/0xdea/raptor_romhack21)
[![](https://img.shields.io/github/watchers/0xdea/raptor_romhack21.svg?style=flat&color=red)](https://github.com/0xdea/raptor_romhack21)
[![](https://img.shields.io/badge/twitter-%400xdea-blue.svg)](https://twitter.com/0xdea)
[![](https://img.shields.io/badge/mastodon-%40raptor-purple.svg)](https://infosec.exchange/@raptor)

> "Converting a memory corruption into a nice weird machine is quite satisfying."
>
> -- Mark Dowd

This repository contains all materials related to *"My last Solaris talk (not your average keynote)"* presented at #RomHack21 on September 25, 2021.

Related links:
https://youtu.be/Nc9ZLTb2hQ8 (video)
http://phrack.org/issues/70/13.html#article (article)
https://security.humanativaspa.it/my-last-solaris-talk-not-your-average-keynote/ (blog)

## article
* [**Exploiting a Format String Bug in Solaris CDE**](https://github.com/0xdea/raptor_romhack21/blob/main/article/phrack70_13.txt). A Phrack article that expands on my presentation.

## exploits
* [**raptor_dtprintcheckdir_sparc2.c**](https://github.com/0xdea/raptor_romhack21/blob/main/exploits/raptor_dtprintcheckdir_sparc2.c). The Solaris/SPARC format string exploit I dissected during my presentation.
* [**raptor_dtprintcheckdir_sparc.c**](https://github.com/0xdea/raptor_romhack21/blob/main/exploits/raptor_dtprintcheckdir_sparc.c). Another version of the same exploit that targets function activation records.
* [**raptor_dtprintcheckdir_intel2.c**](https://github.com/0xdea/raptor_romhack21/blob/main/exploits/raptor_dtprintcheckdir_intel2.c). Solaris/Intel format string exploit.
* [**raptor_dtprintcheckdir_intel.c**](https://github.com/0xdea/raptor_romhack21/blob/main/exploits/raptor_dtprintcheckdir_intel.c). Solaris/Intel stack-based buffer overflow exploit.

## slides
* [**last.pdf**](https://github.com/0xdea/raptor_romhack21/blob/main/slides/last.pdf). Slide deck presented at #RomHack21 (PDF version).
* [**last.pptx**](https://github.com/0xdea/raptor_romhack21/blob/main/slides/last.pptx). Slide deck presented at #RomHack21 (PowerPoint version).