Playing Hacks and Stuffs!
Binary exploitation involves taking advantage of a bug or vulnerability in order to cause unintended or unanticipated behaviour in the program. Memory corruption is a common form of challenges seen in the Binary. Exploitation category.
ROPStack Pivot, ROPRet2Libc, ROPOOB Write, ROPRet2CSU, ROPEnvironment HijackSROPROPOOB Read, Ret2WinSeccompOne Byte Overflow, Ret2WinROP ROP (Ret2Libc @Write)ROP (Ret2Libc)ROP (Format String Write)ROP (Ret2PLT)ROP (PIE Leak + Stack Pivot + Ret2Libc)ROP (Section Data Write)ROP (PIE Leak + Canary Bypass + Ret2LibcVariable OverwriteRet2PltROP (Section Data Write)Ret2Win + ArgumentROPRet2WinROP (Ret2Libc)Ret2Win, WindowsROP (Section Data Write + Syscall) Format StringRet2Win + ArgumentsRet2Win, Movap Stack AllignmentRet2WinRet2ShellcodeFormat StringRet2WinRet2ShellcodeSeccomp Protections, ShellcodeRet2ShellcodeVariable OverwriteRet2WinVariable OverwriteRet2Win With ParametersRet2WinVariable OverwriteRet2ShellcodeRet2LibcRet2ShellcodeVariable Overwrite, Ret2WinRet2WinRet2Win, Movaps Stack AllignmentVariable OverwriteVariable OverwriteVariable Overwrite