Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/hupe1980/exploit-exercises
Ubuntu vagrant box with 32/64 bit protostar binaries to practice exploit development.
https://github.com/hupe1980/exploit-exercises
exploit gdb peda protostar pwntools
Last synced: 20 days ago
JSON representation
Ubuntu vagrant box with 32/64 bit protostar binaries to practice exploit development.
- Host: GitHub
- URL: https://github.com/hupe1980/exploit-exercises
- Owner: hupe1980
- License: mit
- Created: 2021-08-16T07:14:26.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2021-08-17T22:10:32.000Z (over 3 years ago)
- Last Synced: 2024-12-16T20:32:44.752Z (21 days ago)
- Topics: exploit, gdb, peda, protostar, pwntools
- Language: C
- Homepage:
- Size: 27.3 KB
- Stars: 1
- Watchers: 3
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# exploit-exercises
Ubuntu vagrant box with 32/64 bit protostar binaries to practice exploit development.## How to use
```bash
vagrant up
vagrant sshcd exercises
```## Protostar
Protostar introduces basic memory corruption issues such as buffer overflows, format strings and heap exploitation under “old-style” Linux system that does not have any form of modern exploit mitigation systems enabled.## Installed GDB Extensions
```bash
alias peda="gdb -iex 'source /opt/peda/peda.py' --nh -q"
alias gef="gdb -iex 'source /opt/gef/gef.py' --nh -q"
alias pwndbg="gdb -iex 'source /opt/pwndbg/gdbinit.py' --nh -q"
```### PEDA
PEDA (Python Exploit Development Assistance) is an extension to GDB that adds on a whole bunch of useful commands and quality of life improvements to the standard GDB experience. The provisioning script should have made the necessary additions to the GDB configuration so all you need to do to start it is launch GDB with the alias `peda`.```bash
$ peda binary
```### GEF
GEF (pronounced ʤɛf - "Jeff") is a set of commands for x86/64, ARM, MIPS, PowerPC and SPARC to assist exploit developers and reverse-engineers when using old school GDB. It provides additional features to GDB using the Python API to assist during the process of dynamic analysis and exploit development. Application developers will also benefit from it, as GEF lifts a great part of regular GDB obscurity, avoiding repeating traditional commands, or bringing out the relevant information from the debugging runtime.```bash
$ gef binary
```### pwndbg
pwndbg (/poʊndbæg/) is a GDB plug-in that makes debugging with GDB suck less, with a focus on features needed by low-level software developers, hardware hackers, reverse-engineers and exploit developers.```bash
$ pwndbg binary
```