Hack The Box Challenges (Pwn)
Personal writeups from Hack The Box challenges with nice explanations, techniques and scripts
<- HTB CHALLENGESPwn - Total:
58

CTF64-bit binary. Buffer Overflow. ret2libc 
CTFPython internals. Fake object primitive 
CTF64-bit binary. Heap exploitation. House of Spirit. Heap feng-shui. Overlapping chunks. Tcache poisoning. TLS-storage dtor_list

CTF64-bit static binary. Buffer Overflow. SROP and sys_mprotect

CTF64-bit binary. Heap exploitation. Heap feng shui. House of Einherjar. Format String vulnerability 
CTF64-bit binary. Buffer Overflow. ret2reg. Shellcode 
CTF32-bit binary. Egg Hunter 
CTF64-bit binary. Format String vulnerability. Local variable modification 
CTF64-bit binary. Rust. Buffer Overflow. Unicode characters. Local variable modification 
CTF64-bit binary. Buffer Overflow. vDSO ROP. sys_execve
. seccomp
rules 
CTFQuestions about binary exploitation 
CTFKernel exploitation. Password hash cracking. Race condition. Double Fetch 
CTF32-bit binary. Buffer Overflow. vDSO ROP. sys_execve

CTF64-bit binary. Glibc 2.35. Buffer Overflow. ROP 
CTF64-bit binary. Heap exploitation. Fast Bin dup. Messing with main_arena

CTFARM 32-bit binary. Buffer Overflow. ret2csu. ret2libc 
CTF64-bit binary. Heap exploitation. OOB read and write. Integer Overflow. Floating point numbers. TLS-storage dtor_list

CTF64-bit binary. Heap exploitation. Buffer Overflow. Floating point numbers. Canary bypass. ret2libc. Oracle 
CTF64-bit binary. Partial GOT overwrite. OOB write 
CTF64-bit binary. Heap exploitation. Integer overflow. Heap overflow. ret2libc 
CTFKernel exploitation. Heap exploitation. seq_operations
. ret2user 
CTF64-bit binary. Blind Format String. Buffer Overflow. ret2libc 
CTF64-bit binary. Buffer Overflow. Threads. Canary bypass. ret2libc 
CTF64-bit binary. Heap exploitation. Off-by-one. Overlapping chunks. Tcache poisoning 
CTF64-bit binary. Heap exploitation. Null-byte poison. Overlapping chunks. Tcache poisoning. ROP chain. seccomp
rules 
CTFQuestions about binary exploitation 
CTF64-bit binary. Buffer Overflow. Format String vulnerability. FILE
structure attack. GOT overwrite 
CTF64-bit binary. Heap exploitation. Heap feng shui. Tcache poisoning. FILE
structure attack 
CTF64-bit binary. OOB. GOT overwrite 
CTF64-bit binary. Buffer Overflow. ret2dlresolve 
CTF64-bit binary. Heap exploitation. House of Spirit 
CTF64-bit binary. Buffer Overflow. Brute force. Stack Pivot. ret2libc 
CTF64-bit binary. Heap exploitation. Use After Free 
CTF32-bit binary. Buffer Overflow. Custom shellcode 
CTF64-bit binary. Heap exploitation. Use After Free. Fast Bin attack 
CTF64-bit binary. Buffer Overflow. ret2libc 
CTF64-bit binary. Buffer Overflow. Integer Overflow. Alphanumeric shellcode 
CTF64-bit binary. Buffer Overflow. PIE and ASLR bypass. Special ROP chain. ret2libc 
CTF64-bit binary. Buffer Overflow. ret2libc 
CTF64-bit binary. Heap exploitation. Safe-linking. Out-of-bounds write. Tcache poisoning. Exit handlers 
CTF64-bit binary. Buffer Overflow. open-read-write ROP chain 
CTF64-bit binary. Format String vulnerability. GOT overwrite 
CTF64-bit binary. union
structure. Type confusion 
CTF64-bit binary. Format String vulnerability. GOT overwrite 
CTF64-bit binary. Buffer Overflow. ret2libc. Bypass PIE and ASLR 
CTF64-bit static binary. JOP. sys_rt_sigreturn
and sys_execve

CTF64-bit binary. Buffer Overflow. Shellcode 
CTF64-bit binary. Format String vulnerability 
CTF64-bit binary. Format String vulnerability 
CTF64-bit binary. Buffer Overflow. ret2libc 
CTF64-bit binary. seccomp
rules. open-read-write shellcode 
CTF64-bit binary. seccomp
rules. Custom shellcode 
CTF64-bit binary. Buffer Overflow. Local variable modification 
CTF64-bit binary. Buffer Overflow. Redirecting program execution 
CTF64-bit binary. Bug abuse. XOR cipher 
CTF64-bit binary. Buffer Overflow. Redirecting program execution 
CTF64-bit binary. Format String vulnerability. Local variable modification