Playing Hacks and Stuffs!
Binary exploitation involves taking advantage of a bug or vulnerability in order to cause unintended or unanticipated behaviour in the program. Memory corruption is a common form of challenges seen in the Binary. Exploitation category.
Format String, Partial Overwrite, Stack Pivot, ROP
ROP
Stack Pivot, ROP
Ret2Libc, ROP
OOB Write, ROP
Ret2CSU, ROP
Environment Hijack
SROP
ROP
OOB Read, Ret2Win
Seccomp
One Byte Overflow, Ret2Win
ROP
ROP (Ret2Libc @Write)
ROP (Ret2Libc)
ROP (Format String Write)
ROP (Ret2PLT)
ROP (PIE Leak + Stack Pivot + Ret2Libc)
ROP (Section Data Write)
ROP (PIE Leak + Canary Bypass + Ret2Libc
Variable Overwrite
Ret2Plt
ROP (Section Data Write)
Ret2Win + Argument
ROP
Ret2Win
ROP (Ret2Libc)
Ret2Win, Windows
ROP (Section Data Write + Syscall)
Format String
Ret2Win + Arguments
Ret2Win, Movap Stack Allignment
Ret2Win
Ret2Shellcode
Format String
Ret2Win
Ret2Shellcode
Seccomp Protections, Shellcode
Ret2Shellcode
Variable Overwrite
Ret2Win
Variable Overwrite
Ret2Win With Parameters
Ret2Win
Variable Overwrite
Ret2Shellcode
Ret2Libc
Ret2Shellcode
Variable Overwrite, Ret2Win
Ret2Win
Ret2Win, Movaps Stack Allignment
Variable Overwrite
Variable Overwrite
Variable Overwrite