echo2
Description Pwn this echo service. download : http://pwnable.kr/bin/echo2 Running at : nc pwnable.kr 9011 checksec Decompiled-src main echo1 echo2 echo3 cleanup Solution 1. main 함수의… 더 보기 »echo2
Description Pwn this echo service. download : http://pwnable.kr/bin/echo2 Running at : nc pwnable.kr 9011 checksec Decompiled-src main echo1 echo2 echo3 cleanup Solution 1. main 함수의… 더 보기 »echo2
Description Daddy told me I should study arm.But I prefer to study my leg! Download : http://pwnable.kr/bin/leg.cDownload : http://pwnable.kr/bin/leg.asm ssh [email protected] -p2222 (pw:guest) Source Code… 더 보기 »leg
Description Pwn this echo service. download : http://pwnable.kr/bin/echo1 Running at : nc pwnable.kr 9010 checksec ASLR 및 카나리 보호기법 X + 쉘코드 실행 가능 Decompiled-src… 더 보기 »echo1
Description I made a new system call for Linux kernel.It converts lowercase letters to upper case letters.would you like to see the implementation? Download :… 더 보기 »syscall
Description I made a RPG game for my little brother.But to trick him, I made it impossible to win.I hope he doesn’t get too angry… 더 보기 »dragon
Description I don’t think this is exploitable bug. do you agree? (task is patched. unintended easy solutions will not work from now :P) ssh [email protected]… 더 보기 »unexploitable
Daddy, teach me how to use random value in programming! ssh [email protected] -p2222 (pw:guest) 문제의 소스코드는 위와 같다.rand() 함수로 받은 random 값과 사용자로부터 받은 key… 더 보기 »random
Daddy told me about cool MD5 hash collision today.I wanna do something like that too! ssh [email protected] -p2222 (pw:guest) 소스코드 hashcode 변수에 0x21DD09EC 값이 들어있고,… 더 보기 »collision