Learning to Solve basic Crackme's with Pwnable.kr

Throughout the journey I will reference multiple sources and people to gain a better understanding of binary exploitation and reverse engineering at large.
To being in my journey I will go through
https://research.checkpoint.com/wp-content/uploads/2020/03/pwnable_writeup.pdf



I attempted http://microcorruption.com/  but with my current knowledge I can't even begin to understand what's going on. I would have to continue on the SLAE course and work more with disassemblers to read the assembly instructions and work with their debugger.

Onto pwnable.kr challenges, challenge 0x02 Bof, a buffer overflow challenge with the source code included to look at.







Looking at the source code with my limited knowledge on writing and reading we can see that they import standard input output, the string header file, and the standard library.
 

They initialize key as a variable, initialize a buffer of 32 bits for "overflow me", prints that statement to console. 

They then ask for inputs with gets 

(which is a dangerous for memory error if implemented incorrectly, it just seeks input without verifying how much data will fit in the buffer)

Work in progress, continuing tomorrow

Comments

Post a Comment

Popular posts from this blog