Explotación de binarios - Total: 16

CTF
zero_to_hero
picoCTF 2019. 500 puntos. Binario de 64 bits. Explotación del heap. Null-byte poison. Tcache poisoning




CTF
Cache Me Outside
picoCTF 2021. 70 puntos. Binario de 64 bits. Explotación del heap. Tcache poisoning


CTF
The Office
picoCTF 2021. 400 puntos. Binario de 32 bits. Explotación del heap. Heap overflow. PRNG. Use After Free

CTF
Bizz Fuzz
picoCTF 2021. 500 puntos. Binario de 32 bits. Ingeniería inversa. Largo camino hasta un Buffer Overflow oculto. Control del flujo de ejecución del programa

CTF
fermat-strings
picoMini by redpwn. 250 puntos. Binario de 64 bits. Format String. Sobrescritura de la GOT y bypass de ASLR

CTF
Unsubscriptions Are Free
picoCTF 2021. 100 puntos. Binario de 32 bits. Explotación del heap. Use After Free


CTF
Guessing Game 2
picoCTF 2020 Mini-Competition. 300 puntos. Binario de 32 bits. Buffer Overflow y Format String. ret2libc. Bypass de ASLR y canary

CTF
Guessing Game 1
picoCTF 2020 Mini-Competition. 250 puntos. Binario estático de 64 bits. Buffer Overflow. ROP chain


CTF
clutter-overflow
picoMini by redpwn. 150 puntos. Binario de 64 bits. Buffer Overflow. Modificación de variables locales
