Premium Only Content
![Leaking Secret Data with a Heap Overflow - "Leek" Pwn Challenge [Angstrom CTF 2023]](https://1a-1791.com/video/s8/1/T/3/u/s/T3usj.qR4e-small-Leaking-Secret-Data-with-a-.jpg)
Leaking Secret Data with a Heap Overflow - "Leek" Pwn Challenge [Angstrom CTF 2023]
Video walkthrough for the binary exploitation (pwn) challenge, "Leek" from the Angstrom capture the flag (CTF) competition 2023. The challenge involves performing a heap overflow to overwrite all null bytes between our user input chunk and secret data chunk so that when puts() is called, it prints both chunks (there's no null terminator separating them). After this, we need to repair the header of the chunk we modified so that the program can continue execution. We repeat this process of leaking and submitting the random (secret) bytes 100 times, at which point we receive the flag! Write-ups/tutorials aimed at beginners - Hope you enjoy 🙂 #Angstrom #AngstromCTF #CTF #Pentesting #OffSec #Pwn #BinaryExploitation #Reversing #ReverseEngineering
↢Social Media↣
Twitter: https://twitter.com/_CryptoCat
GitHub: https://github.com/Crypto-Cat/CTF
HackTheBox: https://app.hackthebox.eu/profile/11897
LinkedIn: https://www.linkedin.com/in/cryptocat
Reddit: https://www.reddit.com/user/_CryptoCat23
YouTube: https://www.youtube.com/CryptoCat23
Twitch: https://www.twitch.tv/cryptocat23
↢AngstromCTF↣
https://ctftime.org/event/1859
https://2023.angstromctf.com/challenges
https://discord.gg/Dduuscw
https://twitter.com/angstromctf
↢Resources↣
Ghidra: https://ghidra-sre.org/CheatSheet.html
Volatility: https://github.com/volatilityfoundation/volatility/wiki/Linux
PwnTools: https://github.com/Gallopsled/pwntools-tutorial
CyberChef: https://gchq.github.io/CyberChef
DCode: https://www.dcode.fr/en
HackTricks: https://book.hacktricks.xyz/pentesting-methodology
CTF Tools: https://github.com/apsdehal/awesome-ctf
Forensics: https://cugu.github.io/awesome-forensics
Decompile Code: https://www.decompiler.com
Run Code: https://tio.run
↢Chapters↣
Start: 0:00
Patch lib-c (pwninit): 0:20
Test the program functionality: 1:05
Check the binary protections (checksec): 1:37
Analyse decompiled code (ghidra): 3:53
Recap of analysis: 6:51
PwnTools script: 8:40
Setup breakpoints: 14:38
Debug with GDB (pwndbg): 15:33
Heap recap (chunk structure): 16:20
Reviewing vulnerability / exploit: 18:01
Finish PwnTools script: 20:40
Test against remote server: 24:13
Final recap: 25:07
End: 25:56
-
2:03:12
Badlands Media
11 hours agoBaseless Conspiracies Ep. 140: Benghazi Whistleblower Nick Noe - Part 2
89.1K38 -
3:06:47
Laura Loomer
8 hours agoEP131: Zohran Mamdani's Radical Roots EXPOSED
41.8K27 -
2:42:53
TimcastIRL
9 hours agoDOJ Drops MASSIVE Epstein COVER UP, Says There's NO CLIENT LIST | Timcast IRL
242K162 -
54:25
Inverted World Live
8 hours agoThe JFK Assassination and How the CIA Made the Zapruder Film | Ep. 70
35.5K11 -
10:11:25
SpartakusLIVE
15 hours ago$18,000 2v2 WZ Total Frenzy Tournament || #1 Comp Champ is BACK
92.5K4 -
8:11
MattMorseTV
1 day ago $18.18 earnedMacron just SURRENDERED.
81.6K99 -
1:35:03
Glenn Greenwald
11 hours agoTrump DOJ: There's Nothing to the Epstein Story; State Dept: Syria's Al-Qaeda are No Longer "Terrorists;" Trump & Lula Exchange Barbs Over Brazil | SYSTEM UPDATE #482
171K151 -
2:18:39
We Like Shooting
21 hours ago $7.90 earnedWe Like Shooting 618 (Gun Podcast)
48.5K -
2:42:17
Barry Cunningham
10 hours agoHERE'S WHY SOME IN MAGA ARE SO NEGATIVE ABOUT PRESIDENT TRUMP?
89.9K41 -
1:54:30
Joker Effect
8 hours agoWhy Gaming Streamers Aren't Successful and How To Fix It. Tim The Tatman was RIGHT... Kinda
44.7K3