Jump to content
Nytro

Exercises for learning Reverse Engineering and Exploitation

Recommended Posts

Posted

exrs

Exercises for learning Reverse Engineering and Exploitation.

All binaries for these challenges are ELF 64-bit LSB executable, x86-64.

reverse engineering

The goal is to run the chalenges like this ./rX password and having them print out password OK. It's reverse engineering, not cracking. So don't patch the binnaries if you want to play by the rules. It gets really borring if you don't anyway.

sploit

All the sploit exercices are designed to be solvable with NX+ASLR without being dependant on which libc is used. The idea is you should only interact with stdin / stdout as if it was a remote service, argv & env is not needed for exploitation.

The goal is of course to spawn a shell on each one. All of them are tested.

Of course you can still do whatever you like, have fun!

Link: https://github.com/wapiflapi/exrs

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...