Premium Only Content
Leaking Secret Data with a Heap Overflow - "Leek" Pwn Challenge [Angstrom CTF 2023]
Video walkthrough for the binary exploitation (pwn) challenge, "Leek" from the Angstrom capture the flag (CTF) competition 2023. The challenge involves performing a heap overflow to overwrite all null bytes between our user input chunk and secret data chunk so that when puts() is called, it prints both chunks (there's no null terminator separating them). After this, we need to repair the header of the chunk we modified so that the program can continue execution. We repeat this process of leaking and submitting the random (secret) bytes 100 times, at which point we receive the flag! Write-ups/tutorials aimed at beginners - Hope you enjoy 🙂 #Angstrom #AngstromCTF #CTF #Pentesting #OffSec #Pwn #BinaryExploitation #Reversing #ReverseEngineering
↢Social Media↣
Twitter: https://twitter.com/_CryptoCat
GitHub: https://github.com/Crypto-Cat/CTF
HackTheBox: https://app.hackthebox.eu/profile/11897
LinkedIn: https://www.linkedin.com/in/cryptocat
Reddit: https://www.reddit.com/user/_CryptoCat23
YouTube: https://www.youtube.com/CryptoCat23
Twitch: https://www.twitch.tv/cryptocat23
↢AngstromCTF↣
https://ctftime.org/event/1859
https://2023.angstromctf.com/challenges
https://discord.gg/Dduuscw
https://twitter.com/angstromctf
↢Resources↣
Ghidra: https://ghidra-sre.org/CheatSheet.html
Volatility: https://github.com/volatilityfoundation/volatility/wiki/Linux
PwnTools: https://github.com/Gallopsled/pwntools-tutorial
CyberChef: https://gchq.github.io/CyberChef
DCode: https://www.dcode.fr/en
HackTricks: https://book.hacktricks.xyz/pentesting-methodology
CTF Tools: https://github.com/apsdehal/awesome-ctf
Forensics: https://cugu.github.io/awesome-forensics
Decompile Code: https://www.decompiler.com
Run Code: https://tio.run
↢Chapters↣
Start: 0:00
Patch lib-c (pwninit): 0:20
Test the program functionality: 1:05
Check the binary protections (checksec): 1:37
Analyse decompiled code (ghidra): 3:53
Recap of analysis: 6:51
PwnTools script: 8:40
Setup breakpoints: 14:38
Debug with GDB (pwndbg): 15:33
Heap recap (chunk structure): 16:20
Reviewing vulnerability / exploit: 18:01
Finish PwnTools script: 20:40
Test against remote server: 24:13
Final recap: 25:07
End: 25:56
-
24:13
Jasmin Laine
7 hours agoPoilievre Can’t Stop LAUGHING—Liberals IMPLODE After U.S. Ambassador Calls Them Out
75811 -
LIVE
Mally_Mouse
5 days ago🎮 Throwback Thursday! Let's Play: Kingdom Hearts 1 pt. 4
505 watching -
25:14
Stephen Gardner
2 hours agoCLINTONS PANIC AS ARREST CALLS EXPLODE – Scott Jennings GOES OFF! 😱
2.83K4 -
LIVE
megimu32
1 hour agoON THE SUBJECT: Throwback Thursday | Wheel of Nostalgia Chaos!
196 watching -
LIVE
Flyover Conservatives
21 hours agoTrojan Horse in the Big Apple? Prophetic Warning w/ Robin D. Bullock | FOC Show
1,673 watching -
LIVE
Precision Rifle Network
1 day agoS5E6 Guns & Grub - The Boys Are Back!
61 watching -
LIVE
SynthTrax & DJ Cheezus Livestreams
4 days agoLumines - Arise - DJ Cheezus Birthday Stream
91 watching -
1:00:41
Glenn Greenwald
6 hours agoEXCLUSIVE: Succession Actress & Podcast Host Dasha Nekrasova Speaks Out About Hollywood Cancellation Over Fuentes Interview | SYSTEM UPDATE #549
99.2K69 -
31:27
Robbi On The Record
8 hours ago $1.20 earnedAstrology VS God: The Conversation Culture Has Been Avoiding | ft. JT Follows JC
9.95K5 -
LIVE
SOLTEKGG
1 hour ago🟢 Live: Pro Player Returns to Battlefield 6 RED SEC
52 watching