To access material, start machines and answer questions login.
Prerequisites
Before jumping into this room, there are some prerequisites to complete the challenges:
- C programming language
- Assembly language (basics)
- Some experience in reverse engineering, using debuggers, understanding low-level concepts
- Python scripting and pwntools
- A lot of patience
These are the things you're going to learn in this room:
- Buffer overflow
- Modify variable's value
- Return to win
- Return to shellcode
- Integer Overflow
- Format string exploit
- Bypassing mitigations
- GOT overwrite
- Return to PLT
- Playing with ROP
Start the Machine
If you feel you're ready to enter the land of pwn and pain click the Start Machine button to get started. Please allow around 5 minutes for all the challenges to become available.
I hope you enjoy this room. Keep an eye out for more binary exploitation challenges in my next room.
Important Note
You're working with a Ubuntu 20.04 LTS VM, so there will be stack alignment issues, make sure to add a ret gadget to solve it.
This should give you a start: 'AAAAAAAAAAA'
Challenge is running on port 9001
The challenge is running on port 9003
The challenge is running on port 9007
The challenge is running on port 9008
The challenge is running on port 9009
Created by
Room Type
Free Room. Anyone can deploy virtual machines in the room (without being subscribed)!
Users in Room
6,914
Created
1190 days ago
Ready to learn Cyber Security? Create your free account today!
TryHackMe provides free online cyber security training to secure jobs & upskill through a fun, interactive learning environment.
Already have an account? Log in