W3ndige Student Beginners's journey through the world of security, programming and system administration. In love with GNU/Linux and cryptography.

ROP Emporium - badchars

Today we’re going to learn how to use different assembly instructions to help us write a string to a memory, with restriction that we can’t use some characters. But with the knowledge from previous challenge, it shouldn’t be much harder bypass these checks and get the flag.

ROP Emporium - write4

In this post we’re going to exploit 4-th challenge from Rop Emporium called write4. This time, we don’t have any string that will help us viewing the flag, we have to manually place it using different gadgets. Another technique in our sleeve, right?

ROP Emporium - callme

In this challenge from Rop Emporium, we’re going to learn how to set up function arguments using gadgets and chain different calls to function in order to get correct result. If you’ve completed previous challenges ret2win and split, this challenge shouldn’t be any harder, you just have to use previous knowledge and some logic in order to get to the flag.

ROP Emporium - split

Today we’re going to deal with challenge slightly more difficult than the previous one. Together with the knowledge of the ret2win challenge, this one should help us discover different techniques and tricks that may come handy during dealing with similar binaries.

ROP Emporium - ret2win

Today we’re going to walk through a first challenge from the ROP Emporium, website which contains a series of challenges designed to teach about Return Oriented Programming. It’s an exploitation technique that is used to bypass security measures in binary that disallow us to place and execute shellcode in memory during the usual buffer overflow.

© 2016 - 2019 Root Network Security. Made with