Exploitation challenges
The binaries that you have to exploit are provided in the VM under the folder "challenges".
Link to VM
- The vulnerability is obvious in almost all challenges so that the focus is on exploit development.
- Some challenges may appear impossible but they are exploitable.
- You are required to use the type of shellcode specified to consider the challenge as completed.
- Hardcoding stack address is allowed unless explicitly prohibited in the challenge description.
Prepare yourself to bypass guards, break some windows, close the blinds, use your feng shui and jump ROPe your way through these challenges.
- Filename: exp-c1.exe
- Constraints:
- Shellcode: Execute calculator
Useless Hint: Vanilla