Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/nyuuuukie/override
🔐 More reverse engineering and exploiting!
https://github.com/nyuuuukie/override
21school 42projects 42school override
Last synced: 4 days ago
JSON representation
🔐 More reverse engineering and exploiting!
- Host: GitHub
- URL: https://github.com/nyuuuukie/override
- Owner: nyuuuukie
- Created: 2022-11-14T21:34:05.000Z (almost 2 years ago)
- Default Branch: main
- Last Pushed: 2022-12-11T16:35:40.000Z (almost 2 years ago)
- Last Synced: 2023-09-17T19:35:51.352Z (about 1 year ago)
- Topics: 21school, 42projects, 42school, override
- Language: Assembly
- Homepage:
- Size: 56.6 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# override
The final project in the cybersecurity branch.
The goal is to pass 10 levels:| Level | Exploit\Technique\Breach |
| ----- | ------- |
| [level00](/level00/walkthrough.md) | Passing suitable argument |
| [level01](/level01/walkthrough.md) | Buffer overflow, ret2libc |
| [level02](/level02/walkthrough.md) | Format string attack |
| [level03](/level03/walkthrough.md) | Passing suitable argument |
| [level04](/level04/walkthrough.md) | Buffer overflow, ret2libc |
| [level05](/level05/walkthrough.md) | Format string attack, GOT rewriting |
| [level06](/level06/walkthrough.md) | Passing suitable argument |
| [level07](/level07/walkthrough.md) | Passing suitable argument |
| [level08](/level08/walkthrough.md) | Privilege escalation with symbolic link |
| [level09](/level09/walkthrough.md) | Buffer overflow, ret2func |## References
- [stack protection](https://developers.redhat.com/articles/2022/06/02/use-compiler-flags-stack-protection-gcc-and-clang#control_flow_integrity)
- [asm instructions at the beginning of the frame](https://reverseengineering.stackexchange.com/questions/15173/what-is-the-purpose-of-these-instructions-before-the-main-preamble)
- [frame structure](https://reverseengineering.stackexchange.com/questions/14880/basic-reversing-question-about-local-variable/14883#14883)
- [rpath vs runpath](https://medium.com/obscure-system/rpath-vs-runpath-883029b17c45)
- [compiling a shared library](https://amir.rachum.com/blog/2016/09/17/shared-libraries/#compiling-a-shared-library)
- [ret2shellcode](https://wiki.bi0s.in/pwning/stack-overflow/return-to-shellcode/)
- [stack protector](https://mudongliang.github.io/2016/05/24/stack-protector.html)