Playing Hacks and Stuffs!
Binary exploitation involves taking advantage of a bug or vulnerability in order to cause unintended or unanticipated behaviour in the program. Memory corruption is a common form of challenges seen in the Binary. Exploitation category.
Format String, Partial Overwrite, Stack Pivot, ROPROPStack Pivot, ROPRet2Libc, ROPOOB Write, ROPRet2CSU, ROPEnvironment HijackSROPROPOOB Read, Ret2WinSeccompOne Byte Overflow, Ret2WinROP ROP (Ret2Libc @Write)ROP (Ret2Libc)ROP (Format String Write)ROP (Ret2PLT)ROP (PIE Leak + Stack Pivot + Ret2Libc)ROP (Section Data Write)ROP (PIE Leak + Canary Bypass + Ret2LibcVariable OverwriteRet2PltROP (Section Data Write)Ret2Win + ArgumentROPRet2WinROP (Ret2Libc)Ret2Win, WindowsROP (Section Data Write + Syscall) Format StringRet2Win + ArgumentsRet2Win, Movap Stack AllignmentRet2WinRet2ShellcodeFormat StringRet2WinRet2ShellcodeSeccomp Protections, ShellcodeRet2ShellcodeVariable OverwriteRet2WinVariable OverwriteRet2Win With ParametersRet2WinVariable OverwriteRet2ShellcodeRet2LibcRet2ShellcodeVariable Overwrite, Ret2WinRet2WinRet2Win, Movaps Stack AllignmentVariable OverwriteVariable OverwriteVariable Overwrite