Premium Only Content
Leaking Secret Data with a Heap Overflow - "Leek" Pwn Challenge [Angstrom CTF 2023]
Video walkthrough for the binary exploitation (pwn) challenge, "Leek" from the Angstrom capture the flag (CTF) competition 2023. The challenge involves performing a heap overflow to overwrite all null bytes between our user input chunk and secret data chunk so that when puts() is called, it prints both chunks (there's no null terminator separating them). After this, we need to repair the header of the chunk we modified so that the program can continue execution. We repeat this process of leaking and submitting the random (secret) bytes 100 times, at which point we receive the flag! Write-ups/tutorials aimed at beginners - Hope you enjoy 🙂 #Angstrom #AngstromCTF #CTF #Pentesting #OffSec #Pwn #BinaryExploitation #Reversing #ReverseEngineering
↢Social Media↣
Twitter: https://twitter.com/_CryptoCat
GitHub: https://github.com/Crypto-Cat/CTF
HackTheBox: https://app.hackthebox.eu/profile/11897
LinkedIn: https://www.linkedin.com/in/cryptocat
Reddit: https://www.reddit.com/user/_CryptoCat23
YouTube: https://www.youtube.com/CryptoCat23
Twitch: https://www.twitch.tv/cryptocat23
↢AngstromCTF↣
https://ctftime.org/event/1859
https://2023.angstromctf.com/challenges
https://discord.gg/Dduuscw
https://twitter.com/angstromctf
↢Resources↣
Ghidra: https://ghidra-sre.org/CheatSheet.html
Volatility: https://github.com/volatilityfoundation/volatility/wiki/Linux
PwnTools: https://github.com/Gallopsled/pwntools-tutorial
CyberChef: https://gchq.github.io/CyberChef
DCode: https://www.dcode.fr/en
HackTricks: https://book.hacktricks.xyz/pentesting-methodology
CTF Tools: https://github.com/apsdehal/awesome-ctf
Forensics: https://cugu.github.io/awesome-forensics
Decompile Code: https://www.decompiler.com
Run Code: https://tio.run
↢Chapters↣
Start: 0:00
Patch lib-c (pwninit): 0:20
Test the program functionality: 1:05
Check the binary protections (checksec): 1:37
Analyse decompiled code (ghidra): 3:53
Recap of analysis: 6:51
PwnTools script: 8:40
Setup breakpoints: 14:38
Debug with GDB (pwndbg): 15:33
Heap recap (chunk structure): 16:20
Reviewing vulnerability / exploit: 18:01
Finish PwnTools script: 20:40
Test against remote server: 24:13
Final recap: 25:07
End: 25:56
-
2:46:06
DDayCobra
6 hours ago $6.88 earnedCobraCast 199
39.1K4 -
2:07:27
TheSaltyCracker
5 hours agoTrump Tower Bombed w/ Cybertruck ReeEEeE Stream 01-01-25
131K262 -
LIVE
FreshandFit
12 hours agoElon Musk BETRAYAL & Mass Censorship On X
7,968 watching -
2:25:43
Darkhorse Podcast
13 hours agoLooking Back and Looking Forward: The 258 Evolutionary Lens with Bret Weinstein and Heather Heying
132K203 -
5:50:16
Pepkilla
11 hours agoRanked Warzone ~ Are we getting to platinum today or waaa
90.2K7 -
DVR
BrancoFXDC
9 hours ago $6.29 earnedHAPPY NEW YEARS - Road to Platinum - Ranked Warzone
81.3K3 -
5:53
SLS - Street League Skateboarding
5 days agoBraden Hoban’s San Diego Roots & Hometown Win | Kona Big Wave “Beyond The Ride” Part 2
91.1K13 -
6:03:57
TheBedBug
14 hours ago🔴 LIVE: EPIC CROSSOVER - PATH OF EXILE 2 x MARVEL RIVALS
94.5K9 -
1:12:45
The Quartering
12 hours agoTerror In New Orleans, Attacker Unmasked, Tesla BLOWS UP At Trump Tower! Are We Under Attack?
157K256 -
1:32:08
Robert Gouveia
13 hours agoNew Year TERROR; Trump Speaks at Mar-a-Lago; Speaker Johnson FIGHT
128K108