Skip to content

Latest commit

 

History

History
59 lines (40 loc) · 2.46 KB

README.md

File metadata and controls

59 lines (40 loc) · 2.46 KB

2024-NCKUCTF-Pwn-Course

⭐⭐ If you find this repository helpful, please give us a star! ⭐⭐

程式安全課程 @ 2024 NCKUCTF Club 成大資安社社課

Binary exploitation (pwn) course for 2024 NCKUCTF Club.

Online labs are available at our CTFd

Environment

Ubuntu 22.04 LTS with glibc version 2.35. (No heap exploitation so that the glibc version doesn't affect that much I think)

Table of Contents

exploit scripts folder contains the solution for lab challenges.

Week 1 - Binary Exploitation 101

Lab Description
got Global Offset Table Hijacking
got_adv Overwrite Global Offset Table of stack_chk_fail to bypass canary
magicgdb Use gdb to dynamically control the program and get the flag
ret2sc Return to shellcode
ret2sc_adv Use shellcode to open, read and write
ret2win Return to win
ret2win_adv Return to win, beware of movaps issue

Week 2 - ROP

Lab Description
ezrop Static linked binary ROP
pivoting Forge rbp and rsp to achieve stack pivoting
ret2libc Leak libc address left in array and return to libc
ret2libc_adv Leak libc address by yourself and return to libc
ret2libc2024 New trick to solve return to libc without csu_init gadgets

Week 3 - Brief Introduction To IoT Security

Lab Description
httpd_patched Reproduce CVE-2023-37144 on Tenda AC10 Firmware V15.03.06.23 using qemu

License

The content of this repository is licensed under the CC-BY-4.0.