Buffer Overflow Exploitation with Radare2 | P21 | HackTheBox Reg

We covered another example of a vulnerable binary to buffer overflow vulnerability. The binary has NX enabled to prevent code execution in…

Buffer Overflow Exploitation with Radare2 | P21 | HackTheBox Reg
HackTheBox Reg

We covered another example of a vulnerable binary to buffer overflow vulnerability. The binary has NX enabled to prevent code execution in the stack but our goal was to control the execution flow and redirect it to the “winner” function to print the flag. We generated a pattern to cause a segmentation fault then we used the address of the “winner” function so that the RIP register points to it after it hits the segmentation fault. This was part of HackTheBox Reg Intro to Binary Exploitation track.

Buffer Overflow Techniques | Methodology and Practical Notes
This 82-Page PDF booklet contains various methods and techniques to exploit binaries using buffer overflow with…

Full writeup can be found here.