Leaking Values with printf (Format String Vuln) - Search Engine - [Intigriti 1337UP LIVE CTF 2022]

preview_player
Показать описание
2nd Pwn video from @intigriti 1337UP LIVE CTF 2022: "Search Engine". We'll take a quick look at format string vulnerabilities (printf) to see how we can leak values off the stack and make a PwnTools fuzzing script to automate the process. Write-ups/tutorials aimed at beginners - Hope you enjoy 🙂 #BinaryExploitation #BufferOverflow #BinExp #RE #Pwn #PwnTools

↢Social Media↣

↢Intigriti↣

↢Resources↣

↢Chapters↣
Start: 0:00
Basic File Checks: 0:22
Disassemble with Ghidra: 0:59
Dynamic Analysis with GDB-PwnDbg: 3:12
Leaking Values off the Stack with printf(): 4:34
PwnTools Script (Fuzzing): 6:25
End: 9:07
Рекомендации по теме
Комментарии
Автор

You can solve this one manually, without PwnTools by entering:

%12$p %13$p %14$p %15$p

Take the pointers that are leaked from the stack, and decode:

_CryptoCat
Автор

Hey what theme do you use for your terminal ?

nintendotyrelle
Автор

Too much content to catch up. you on fire, omg.

longdashes
Автор

Did you know how "run < file.txt" this command will be in radar2?

Shlldn
Автор

Your channel is literally the best place to land if you're trying to learn binexp. Keep the videos coming!

tadeuszwachowski
Автор

Excellent video as always! Thank you! If you take requests, could you do a blind ROP example at some point?

vstorm
Автор

flag from 10 to 15, whay you give 12-16 in thee script? not from 10?

anugrahgilangramadhan